CN100472484C - Feedback loop for spam prevention - Google Patents

Feedback loop for spam prevention Download PDF

Info

Publication number
CN100472484C
CN100472484C CNB2004800037693A CN200480003769A CN100472484C CN 100472484 C CN100472484 C CN 100472484C CN B2004800037693 A CNB2004800037693 A CN B2004800037693A CN 200480003769 A CN200480003769 A CN 200480003769A CN 100472484 C CN100472484 C CN 100472484C
Authority
CN
China
Prior art keywords
user
message
spam
poll
classification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CNB2004800037693A
Other languages
Chinese (zh)
Other versions
CN1809821A (en
Inventor
R·L·朗特瓦特
D·E·黑克尔曼
J·D·梅尔
N·D·豪威尔
M·C·鲁珀斯伯格
D·A·斯劳森
J·T·古德曼
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Microsoft Technology Licensing LLC
Original Assignee
Microsoft Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsoft Corp filed Critical Microsoft Corp
Publication of CN1809821A publication Critical patent/CN1809821A/en
Application granted granted Critical
Publication of CN100472484C publication Critical patent/CN100472484C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Classifications

    • G06Q50/40
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/107Computer-aided management of electronic mailing [e-mailing]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/21Monitoring or handling of messages
    • H04L51/212Monitoring or handling of messages using filtering or selective blocking

Abstract

The subject invention provides for a feedback loop system and method that facilitate classifying items in connection with spam prevention in server and/or client-based architectures. The invention makes uses of a machine-learning approach as applied to spam filters, and in particular, randomly samples incoming email messages so that examples of both legitimate and junk/spam mail are obtained to generate sets of training data. Users which are identified as spam-fighters are asked to vote on whether a selection of their incoming email messages is individually either legitimate mail or junk mail. A database stores the properties for each mail and voting transaction such as user information, message properties and content summary, and polling results for each message to generate training data for machine learning systems. The machine learning systems facilitate creating improved spam filter(s) that are trained to recognize both legitimate mail and spam mail and to distinguish between them.

Description

Be used to prevent the feedback cycle of spam
Technical field
The present invention relates to be used to discern the System and method for of legal (for example good mail) and unwelcome information (for example spam), relate in particular to preventing that spam from classifying to E-mail communication.
Background of invention
Appearance such as global communications network such as the Internets provides the commercial opportunity of getting in touch with a large amount of potential customers' foundation.Electronic information communication, especially Email (" e-mail "), as scatter unwanted advertisement and the sales promotion means of (also claiming " spam ") to the network user, it is more and more general just to become.
Radicati Group Co.,Ltd---a family consulting and market research agency is estimated to as in August, 2002, has every day 2,000,000,000 spam e-mail messages to be sent out---the triplication every two years of this number expected.Individual and the inconvenience day by day of enterprise (for example company, government organs) sensation, and it is tired to be unequal to spam often.Nowadays or be about to become a kind of main threat for Trusted Computing similarly, SPAM.
A kind of gordian technique that is used to hinder SPAM is to use filtering system and/or method.A kind of verified filtering technique is based on machine learning method---and the machine learning filtrator is the probability of spam to importing this message of distribution of messages into.In the method, from two class example messages (for example rubbish and non-rubbish message), extract feature usually, and the Applied Learning filtrator carries out the probability differentiation between two classes.Because many characteristic informations relate to content (for example word and expression in message subject and/or text), this type of filtrator is commonly referred to as " content-based filtrator ".
Some junk/spam filters is adaptive, and this is important, because the user of multi-language user and use rare foreign languages language needs to be adaptive to the filtrator of its specific demand.In addition, not all user can both be and be not to agree on the junk/spam at what.Therefore, by using (for example, via the observing user behavior) filtrator that can implicitly train, each filtrator of dynamically customizing is to satisfy user's particular message identification demand.
Filtering adaptive a kind of method is that the request user is spam and non-spam with message marking.Unfortunately, because the complicacy that is associated with this type of training, this type of manual intensive training technique is unwelcome to many users, let alone correctly realizes the time quantum that this type of training is required.In addition, the personal user usually makes this type of manual training technique defectiveness that becomes.For example, free mail sends the subscription of tabulation often to be forgotten by the user, therefore is designated as spam by mistake.As a result, legitimate mail is blocked indefinitely and is entered user's mailbox.Another kind of adaptive filtering device training method is to use implicit expression training prompting.For example, if the user replys or transmits message, this method supposes that this message is non-spam.Yet, only use this type of message notifying that statistic bias is incorporated in the training process, cause the filtrator of low respective accuracy.
Another method is that the Email with all users is used for training, wherein initial labels is distributed by existing filtrator, and the user uses explicit prompting (for example " user's correction " method) sometimes---for example, select such as " as the spam deletion " and options such as " non-spams "---and/or the implicit expression prompting covers those distribution.Although these class methods are better than previously discussed technology, to compare with claimed the present invention with following description, it is still incomplete.
Summary of the invention
For the basic comprehension to some aspect of the present invention is provided, below provide simplification general introduction of the present invention.This general introduction is not an exhaustive overview of the present invention.It is not attempted to identify key of the present invention and decisive element or describes category of the present invention.Its unique purpose is to propose notions more of the present invention in simplified form, as the preface in greater detail to providing after a while.
The invention provides a kind of feedback loop system and method for with regard to preventing spam, project being classified be convenient to.The present invention has utilized the machine learning method that is applied to twit filter, especially randomly the email message that imports into is sampled, thereby obtains legal and rubbish/spam mail generates training dataset.Previously selected individual takes on spam soldier (fighter), and participates in each copy (optionally making an amendment slightly) of sample is sorted out.
Generally speaking, make amendment in all fields, make it show as polling message choosing the message of using for poll.The aspect of a uniqueness of the present invention is, the message of importing into of choosing the confession poll to use is duplicated, thereby certain user (for example, spam soldier) can (for example receive same message twice, aspect message content): once being the form of polling message, is its primitive form for the second time.Another unique aspect of the present invention is that all message all are considered for poll---comprise that those have been labeled as the message of spam by existing filtrator.The message that is marked as spam is considered for poll, and if selected, do not treat according to the standard of existing filtrator and (for example, move on to Junk E-Mail folder, deletion as spam ...).
Different with conventional twit filter, can train twit filter by feedback technique according to the present invention, make its association distinguish mail and spam, created twit filter more accurately, thereby reduce devious and inaccurate filtration.Feedback is reached its feedback of importing Email into to obtain by the user of any suitable quantity of poll at least in part.It is the task that legitimate mail or spam are put to the vote that the user who is identified as the spam soldier is endowed a selection of importing message into.The good mail (for example, non-spam) that the affirmation and negation classification of importing Email into all is supposed to alleviate using for the user falls as Spam filtering mistakenly.Respective classified and any other are moved in the database with information that each mail transaction is associated, so that the training twit filter.Database and associated component can compile and store the attribute of selected message (or mail transaction of choosing), comprise user property, user decide by vote information and history, such as the message attributes such as unique identifying number of distributing to each selected message, message classification and message content summary or relate to above any statistics, coming is that machine learning system generates training dataset.Machine learning system (for example, neural network, support vector machine (SVM), Bayes's trust network) be convenient to create by training with identification legitimate mail and spam, and can distinguish the two improved twit filter.In case trained new twit filter according to the present invention, then it can be distributed to mail server and client email software programs.In addition, can train new twit filter, to improve the performance of personalized filter with respect to the specific user.When having made up new training dataset, twit filter can stand further training via machine learning, optimizes its performance and accuracy.The user feedback of message classification mode be can also utilize, the tabulation of the twit filter and head of a family control, the performance and/or the identification spam place that rises of test twit filter generated.
Another aspect of the present invention provides a kind of method that detects insincere user by cross-validation technique and/or known results test post.Cross validation relates to trains the poll result's who has got rid of the certain user filtrator.That is, use poll result to train filtrator from user's subclass.On average, even some mistakes are arranged, this usefulness subclass family is still worked finely, is enough to detect those usually and their inconsistent user.To compare from the user's who is excluded the poll result and the result of housebroken filtrator.This has determined to come the user of self-training subclass how to decide by vote belonging to the message that is excluded the user more in fact.If the user's who is excluded voting and the consistance between filtrator are very low, the poll result from this user can be rejected or be labeled for manual examination (check) so.This technology can repeat as required, each data of getting rid of from different user.
Such as filtrator and user voting extremely the mistake of individual message such as inconsistent message also can be detected.These message can be labeled for removing automatically and/or manual examination (check).As the replacement of cross validation, can on complete all or substantially all of user, train filtrator.Can be rejected with inconsistent user's voting of filtrator and/or message.Another replacement of cross validation relates to the known results test post that wherein requires the user that the known message of result is put to the vote.The user verifies this user's credibility to the accurate classification (for example, user's voting and matches filter action) of message, and determines whether to remove from training this user's classification, and whether will remove this user from poll in the future.
Another aspect of the present invention provides establishment known spam target (for example, honey jar (honeypot)) will import mail into and is designated spam, and/or follows the tracks of the processing of particular business e-mail address.Known spam target, or claim honey jar, be the e-mail address that can determine the legitimate mail group and all other mails are considered as spam.For example, can on certain website, reveal e-mail address with the limited form that unlikely be it is found that.Therefore, any Email that sends to this address can be regarded as spam.Perhaps, can only this e-mail address be revealed to expectation and receive the businessman of legitimate email from it.Therefore, the mail of receiving from this businessman is legal, but all other mails of receiving can be considered as spam safely.Can will (for example come from honey jar and/or other source, the user) spam data integration is in feedback loop system, but because use the dramatic growth of the spam classification of honey jar, the weight that should reduce these type of data obtains poll result devious to reduce, and this will describe hereinafter in more detail.
Another aspect of the present invention provides thinks the isolation of uncertain message to feedback loop system or filtrator.This type of message is retained any reasonable time section, rather than is rejected or classifies.Can preestablish this time period, perhaps can keep this message until the poll result who receives the predetermined quantity that is similar to this message (for example, from same IP address or have similar content).
In order to reach aforementioned and relevant purpose, together with the following description and drawings some illustrative aspect of the present invention has been described herein.But these aspects only illustrate the certain methods in the whole bag of tricks that can use principle of the present invention, and the present invention is intended to comprise all these type of aspects and equivalent aspect thereof.When considered in conjunction with the accompanying drawings, other advantage of the present invention and novel feature will be from following to becoming apparent the specific descriptions of the present invention.
The accompanying drawing summary
Figure 1A is the block diagram of feedback cycle training system according to an aspect of the present invention.
Figure 1B is the process flow diagram of exemplary feedback cycle training process according to an aspect of the present invention.
Fig. 2 is according to an aspect of the present invention, is convenient to the process flow diagram of user's mail classifying with the illustrative methods of establishment twit filter.
Fig. 3 is according to an aspect of the present invention, is convenient to the user of the method that participates in Fig. 2 is carried out the process flow diagram of the illustrative methods of cross validation.
Fig. 4 is according to an aspect of the present invention, is convenient to judge the whether process flow diagram of incredible illustrative methods of user.
Fig. 5 is according to an aspect of the present invention, the process flow diagram of being convenient to catch spam and determining the illustrative methods of spam originators.
Fig. 6 is the block diagram based on the feedback loop architecture of client computer according to an aspect of the present invention.
Fig. 7 is according to an aspect of the present invention, has one or more users' of generating training data the block diagram based on the feedback loop system of server.
Fig. 8 is according to an aspect of the present invention, the block diagram of inter-organization feedback loop system based on server, and wherein this system comprises the internal server that carries database, pulls out the training data that is stored on the external user database.
Fig. 9 shows the exemplary environments that is used to realize various aspects of the present invention.
Figure 10 is the schematic block diagram according to exemplary communications environment of the present invention.
The detailed description of invention
With reference now to accompanying drawing, describe the present invention, reference number identical among the figure is used in reference to identical element all the time.In the following description, for illustrative purposes, a large amount of details have been set forth, so that thorough understanding of the present invention to be provided.Yet, obviously can implement the present invention without these details.In other example, the present invention for convenience of description illustrates known structure and equipment with the block diagram form.
As used in the present invention, term " assembly " refers to the relevant entity of computing machine with " system ", combination, software or the executory software of they or hardware, hardware and software.For example, assembly can be, but is not limited to, and runs on process, processor, object, executable code, execution thread, program and/or computing machine on the processor.As an illustration, the application program of moving on server and this server can be assemblies.One or more assemblies can reside in process and/or the execution thread, and assembly can be on the computing machine and/or be distributed between two or many computing machines.
The present invention can be in conjunction with generating relevant various inference schemes and/or the technology of training data with the Spam filtering that is machine learning.As used in this article, term " inference " refers generally to from one group of process via reasoning or inference system, environment and/or state of user the observation of incident and/or data capture.For example, inference can be used for discerning concrete context or action, maybe can generate the probability distribution of state.Inference can be probabilistic---promptly, and based on the probability distribution of the consideration of data and incident being calculated interested state.Inference also can refer to be used for form from one group of incident and/or data the technology of advanced event.This type of inference causes structure new events or action from the one group of observed incident and/or the event data of being stored, and no matter whether each incident is closely related in time, and also no matter each incident and data are from one or several incidents and data source.
Although should be appreciated that running through this instructions uses term message in a large number, this type of term is not limited to Email itself, but can be applicable to rightly and comprise any type of electronic information communication that can be distributed on any suitable communication architecture.For example, the conference applications program of being convenient to the meeting between two people or the many people (for example, interactive chat programs, and instant messaging program) also can utilize the benefit of filtration disclosed herein, because disagreeable text can be spread in the normal chat messages when the user exchanges messages electronically, and/or message, end or above all message are inserted into to start with.In this application-specific, be labeled as spam for the content (for example commercial advertisement, sales promotion or advertisement) of catching non-expectation and with it, filter training can be become automatic fitration particular message content (text and image).
In the present invention, term " recipient " addressee that refers to import into message or project.Term " user " refers to passively or selects to participate in the recipient of feedback loop system and process as described in this article on one's own initiative.
Refer now to Fig. 1, the general block diagram of feedback training system 10 according to an aspect of the present invention is shown.Message sink assembly 12 receives message of importing into (being designated as IM) and the recipient 14 who sends it to expection.() convention for example, twit filter, this message sink assembly can comprise at least one filtrator 16 as many message sink assemblies.Message sink assembly 12 combined filtering devices 16 come processing messages (IM) and to subset of messages after filtration is provided of the recipient 14 of expection (IM ').
As the part of feedback of the present invention aspect, poll assembly 18 receives all message imported into (IM) and identification expection recipient 14 separately.For example, this poll assembly is selected expection recipient's 14 a subclass (being called as spam soldier 20) will import a subclass of message (be designated as IM ") into and is categorized as spam or non-spam.The information (being designated as voting information) that classification is relevant is submitted to message stores/voting storage 22, wherein decides by vote information and each IM " copy be stored for equaling to use after a while such as feedback component 24.Particularly, feedback component 24 has used machine learning techniques (for example, neural network, SVM, Bayesian network or anyly be applicable to machine learning system of the present invention), this machine learning techniques utilization voting information is to come (and/or making up new filtrator) trained and/or improved to filtrator 16 with respect to for example discerning spam.When having handled the new message flow that imports into by the filtrator 16 of new training, spam still less and more legitimate messages (being designated as IM ') are sent to expection recipient 14.Therefore, the feedback of system 10 by utilizing spam soldier 20 to generate promoted the identification of spam and the training of improved twit filter.This type of feedback aspect of the present invention provides and has been used to improve the abundant of spam detection systems and highly dynamic scheme.Various details about more detailed aspect of the present invention below are discussed.
Refer now to Figure 1B, show according to the present invention about resisting feedback cycle training flow process Figure 100 that spam and spam prevent.Before the preparatory stage and/or training process of training process, (for example select the user as the spam soldier, concentrate from the master who comprises all Email Users)---according to the present invention, selection can be based on stochastic sampling or level of trust or any suitable selection scheme/standard.For example, user's subclass of choosing can comprise all users, one group of user who selects at random, decide to do spam soldier's user or the user and/or its combination in any that withdraw from of decision and/or be based in part on its population position and relevant information.
Perhaps, selected Email User master collection can be limited to the paying customer, this can allow spammer need pay higher cost could destroy the present invention.Therefore, user's subclass of selected participation antagonism spam can only comprise the paying customer.With the tabulation that can create the name that comprises the user (for example, spam soldier) who chooses and attribute or client's table.
When having received the message flow 102 that imports into, check the recipient of each message in 104 all spam soldiers' of contrast tabulation.If the recipient is in this tabulation, this message is considered for poll so.Next, determine whether to select message to be used for poll.Different with conventional twit filter, the present invention is imported mail at all at least and is not deleted any message (for example, spam) before being considered for poll.That is, stand this mail of any mark (for example, spam, non-spam) elder generation's classification before at mail---do like this and be convenient to obtain the agonic intelligence sample that can be used for user's poll.
Can use the assembly (not shown) that is used for the message selection to select message, to reduce data deviation by a certain random chance.Another kind method relates to population in use information and other user/recipient's attribute and character.Therefore, can select message based on user/recipient at least in part.There is other replacement algorithm that is used to select message.But, the message number of selecting each time period for each user or each user, or select the probability of message to have restriction from any given user.If there is not this type of restriction, spammer can be created number of the account, send millions of spam messages and all these type of message classifications are good message to it: this will allow spammer to use mistakenly the message of mark to damage tranining database.
The Spam filtering of famous some form that is called as black hole lists may not be skipped.Black hole lists prevents that server from receiving any mail from Internet protocol (IP) address list.Therefore, the selection of message can be from being not to select the mails from black hole lists.
A unique aspect of the present invention is that the selected message that is used for poll that is labeled as spam by current filtrator in place is deleted or move on to Junk E-Mail folder.On the contrary, they are placed on and receive in the common inbox or mailbox of all other message for the poll consideration.But, if message has two copies, and filtrator thinks that this message is spam, so a copy is sent to Junk E-Mail folder, or handle (for example, deletion, signalment or move on to Junk E-Mail folder) according to the parameter of setting.
When a message selected, it be forwarded to the user and with certain particular form mark to indicate that it is polling message.Particularly, the message of choosing can be revised by message modification component 106.The example of message modification includes, but not limited to polling message be navigated to independent file, change " from (from) " address or subject line and/or use to the user special icon or the special color of this message identifier as polling message.Also the message of choosing can be encapsulated in another message, how this another message decides by vote and/or the instruction of the packed message of classifying if providing to the user.For example, these instructions can comprise at least two buttons or link: one is spam with the message voting, and another is non-spam with the message voting.
Before sending the copy of polling message, can realize deciding by vote button by the content of revising message to the user.When using for client email software (relative) when of the present invention, can revise user interface to comprise the voting button with e-mail server.
In addition, polling message can comprise instruction and voting button, and appended selected message.Polling message also can comprise such as subject line, from the address, the summary of the selected message such as first few lines at least of date of shipping and/or date received and text or text.Another kind method relates to deciding by vote instruction and the voting button that it is considered in advance being sent message.In force, when the user opens and/or download the copy of polling message, include but not limited to that the button (or link) of " spam " and " non-spam " button can eject on user interface, perhaps can be incorporated in the polling message.Therefore, each polling message all comprise one group the instruction and suitable voting button be possible.Other modification can be essential, may comprise removing HTML background instructions (they will make the text of instruction or button be difficult to see).
The type that depends on expectation information also can provide such as another buttons such as " commercial E-mail of asking for " buttons.Message also can comprise the button/link that withdraws from poll in the future.Instruction is turned to the language of user preference by this locality, and can be embedded in the polling message.
In addition, choose be used for poll message can by message modification component 106 or by some other suitable virus scan assembly (not shown) Scan for Viruses.If find virus, can peel off this virus or give up this message.Should be appreciated that virus peels off any point of the system that can occur in 100, comprise when message is selected and before the proper user's download message.
Revise after the message, message delivery component 108 transmits polling message for voting to the user.Distribute unique identifier (ID) 110 (for example, metadata) to user feedback (for example, polling message, user's voting and any user property that is associated with it).ID 110 and/or the information corresponding with it are submitted to message stores/voting storage 112 (for example, the central databases) of compiling and storage user classification/voting.
At database level, can preserve can be used for poll the message of choosing for poll or use after a while.In addition, database can be carried out frequency analysis on the timing basis, determine not to specific user's over-sampling, and the data of in the restriction specified as the user, having collected some from this user.Particularly, the percentage limit and the sampling period of feedback system 100 monitoring user mails are to alleviate the deviation of sampling and data.When selecting the user from all available subscribers that comprise low utilization rate and high utilization rate user, this shows important especially.For example, compare the mail of common reception of low utilization rate user and quantity forwarded much less with high utilization rate user.Therefore, system 100 monitors the message selection courses, approximately is in every T the message receiving of user 1 with the message of guaranteeing to choose, and receives 1 message in the every Z of no more than user hour.Therefore, for example, this system can carry out poll (for example, considering to be used for poll) to per 10 in the message 1 of importing into that will be sampled, but no more than per 2 hours 1.This frequency (or number percent) restriction alleviated with high utilization rate user compare, to the low utilization rate user message of disproportionate quantity of sampling, but also alleviated certain user of excessive harassing and wrecking.
Central database 112 scans those message of having been sampled and being used for poll but also not being classified by system 100 often.Database is pulled out these message, and with respect to the ascribed characteristics of population of relative users with they localizations, and create polling message and ask the user to decide by vote and classify these message.But twit filter can just not be modified immediately or train after receiving each new incoming classification.On the contrary, off-line training allows the trainer constantly to check the data that receive in the database 112 on the basis of that be scheduled, ongoing or every day.That is, the trainer is from predetermined starting point or the time quantum set in the past, and checks from these data of lighting forward and train filtrator.For example, the preset time section can be from the midnight to the 6:00 AM.
Can train new twit filter on the afoot basis by with the message classification of safeguarding in machine learning techniques 114 (for example, neural network, support vector machine (the SVM)) analytical database 112.The example that machine learning techniques needs good mail and spam is therefrom learning, thereby they can learn to distinguish the two.Even also can benefit from the example with good mail based on the technology of the known examples of spam of coupling, thereby they can determine the mail that they are not unexpectedly caught.
Therefore, have affirmation and negation examples of spam both, but not only have complaint, be very important.The territory that exists some to send out a large amount of spams simultaneously and send legitimate mail such as tabulation such as free mail.If only based on complaining constructing system, then all mails from these territories can be filtered, and cause a large amount of mistakes.Therefore, know that it is important that this territory also sends out a large amount of good mails.In addition, the user usually makes such as forget mistakes such as they contract in certain free mail transmission tabulation.For example, send out legitimate mail regularly such as large-scale legal suppliers such as New York Times.Some users forget that they are once signatory and complain, thereby are spam with these message classifications.If there are not most of users to recognize that this mail is legal data, coming since then, the mail of website will be blocked.
New filtrator 116 can be by the central database that is distributed to Email or message server, indivedual E-mail client, update service device and/or indivedual companies on the distributed components 118 afoot bases by the Internet service provider (ISP) that participates in.In addition, feedback system is moved on the 100 afoot bases, thereby is considered and the intelligence sample that is used for poll can be followed the actual distribution of the Email that system 100 receives.As a result, be used to train the training dataset of new twit filter for adaptive spammer, to keep up-to-date.When having made up new filtrator, obtain polling data before can based on how long and it is given up or reduce weight (for example, carrying out discount).
When receiving mail, can realize system 100 such as server places such as gateway server, e-mail server and/or message servers.For example, when mail entered e-mail server, this whois lookup expection recipient's attribute determined whether the recipient determines adding system 100.If its attribute shows that so, then these recipients' mail can be used for poll potentially.Also there is the architecture that client computer is only arranged.For example, client email software can be made the poll decision-making for unique user, and central database is arrived in E-mail conveyance, or uses this polling message to improve the performance of personalized filter.Except architecture described herein, other that has this system 100 replaced architecture, and conceives this type of architecture and all fall within the category of the present invention.
Refer now to Fig. 2, according to an aspect of the present invention, show the process flow diagram of basic feedback cycle process 200.Although for explaining simple purpose, with this method representation be described as a series of actions, yet be to be understood that, the present invention is not subjected to the restriction of the order of each action, because according to the present invention, some action can take place by different order, and/or other action that illustrates and describe with this paper takes place simultaneously.For example, it will be understood by those skilled in the art that method can be expressed as such as a series of state or the incidents of being mutually related in the constitutional diagram with being replaced.And, be not the behavior shown in all be to realize that the method according to this invention is necessary.
Process 200 enters such as assembly such as server and by it at 202 place's mails and receives beginning.When the mail arrives server, this server identification expection recipient's attribute is to determine whether determined participation to be used for poll (204) as the spam soldier before the expection recipient.Therefore, process 200 utilizations can indicate the recipient whether to determine to participate in the user property field of this feedback system, perhaps consult the user's of decision participation tabulation.If determine that 206 this user is the participant and the selected poll that is used for of feedback system, this feedback system is by determining that choosing which message to be used for poll (208) takes action.Otherwise process 200 turns back to 202, expects that until at least one that determined to import message into recipient is user (for example, spam soldier).
In force, all message are considered for poll, comprise that those filtrators by current use (for example, personalized filter, Brightmail filtrator) are appointed as the message of (maybe will be) spam.Therefore, before message is considered for poll, do not have message deleted, give up or send to Junk E-Mail folder.
Each message that server is received or message item have one group of attribute corresponding to mail transaction.These attributes of server compiles also send to central database with it with polling message.The example of attribute comprises that the recipient (for example tabulates, as listed in " To:(to) ", " cc:(makes a copy for) ", " bcc:(secretly send) " field), the final conclusion of the filtrator of current use (for example, whether filtrator is spam with message identifier), other (for example can choose twit filter wantonly, the Brightmail filtrator) final conclusion and user profile (for example, the frequency of user name, password, true name, polling message, utilization rate data ...).Polling message and/or its content, and each of corresponding user/recipient all is assigned with a unique identifier.This identifier also can be sent to database, and upgrades as required subsequently.
214, revise selected message (for example, the origination message that is used for poll 1-M, wherein M is the integer more than or equal to 1), with to user's Indication message 1-MIt is polling message P1-PM, and with soon it sends the user to for poll (216).For example, polling message can comprise the attachment typed origination message that will decide by vote, and one group of instruction of message being put to the vote about how.For example, this group instruction comprises such as two buttons such as " good mail " button and " spam " buttons at least.When one of user's button click (218) when having classified the message as mail or spam, the user is directed to the uniform resource locator (URL) of the unique identifier of the classification of submitting to corresponding to the user.This information is recorded, and the record that is associated of this origination message 1-M is updated in the central database.
216 or process 200 during any other reasonable time, origination message is by can randomly being sent to the user.Therefore, the user receives this message twice---once being its primitive form, is amended poll form for the second time.
In certain time after a while, create and trained new twit filter based on user feedback 220 to small part.In case create and trained new twit filter, can on e-mail server, use this filtrator immediately, and/or it can be distributed to client-server, client email software or the like (222).Training and distribute new or upgrade after twit filter be ongoing activity.Therefore, new when importing message flow into when receiving, process 200 continues 204.When having made up new filtrator, obtain than legacy data before based on how long, it is given up or reduce weight.
Feedback system 100 and process 200 depend on the feedback of its participating user.Unfortunately, the certain user is trustless, and is perhaps tangible in lazy the accurate classification of making peace can't be provided.Central database 112 (Figure 1A) the maintenance customer history of classifying.Therefore, feedback system 100 quantity, the user that can the follow the tracks of contradiction number of times, user that change his/her idea is to the response of known good mail and known spam and number of times or the frequency that the user replys polling message.
In these quantity any one surpasses predetermined threshold, or only for each user of system, and feedback system 100 can be called the credibility that or several affirmation technology visit certain or some specific users.According to another aspect of the present invention, a kind of method is a cross validation method 300 as shown in Figure 3.
Cross-validation technique is in 302 beginnings, and central database receives and imports data into such as poll result and respective user information etc.Next, 304, must determine whether to expect that cross validation tests the user of right quantity.If expectation so,, use certain part of importing data into to train new twit filter so 306.That is, the user's data from positive tested person is excluded outside training.For example, use to be subjected to about 90% of polled user data to train filtrator (being designated as 90% filtrator), thereby got rid of 10% (being designated as 10% tested person user) corresponding to the data of the data of submitting to by the tested person user.
308, contrast all the other 10% tested person user data and move 90% filtrator, to determine 90% user how tested person user's message is decided by vote.If the inconsistent amount between 90% filtrator and the 10% tested person user data surpasses predetermined threshold value (310), so 312 can this user of manual examination (check) classification.As an alternative or in addition, can send test post, and/or these specific users are got rid of from poll in the future, and/or give up their data in the past to suspicious or insincere user.But if do not surpass threshold value, this process turns back to 306 so.In force, cross-validation technique 300 can be used for any suitable test subscriber group, gets rid of different users where necessary, judges and safeguard the credibility of voting/grouped data.
The second method of calling party loyalty and reliability is included on all data of collecting in the given period and trains filtrator, tests on training data then, and uses this filtrator.This technology is called as the test (test-on-training) while training.If comprised certain message in the training, this filtrator should be known its classification, for example, the filtrator of acquiring through training should with the same method of user this message of classifying.But filtrator possibility Dauerverbrechen is with its mistake that is labeled as spam when the user is labeled as non-spam with it, and vice versa.For making filtrator and its training data inconsistent, this message must be very inconsistent with other message.Otherwise the filtrator of training is sure finding someway with its correct classification almost.Therefore, this message can be used as and have unreliable label and give up.This technology or cross validation all can use: cross validation can more unreliable real estate class estranged in more mistake; On the contrary, less mistake is found in test more reliably while training.
Test and cross-validation technique 300 all can be applicable to individual message while training, and wherein the individual user is got rid of (for example, following most of people's classification) to the classification or the classification of message by General Agreement.Alternatively, two kinds of technology all can be used for discerning potential unreliable user.
Except cross validation and/or while training the measuring technology, or substitute, can use " known results " technology to verify user's credibility (and then 314 to Fig. 4) as it.The technology of Fig. 3 and 4 although demonstrated individually should be appreciated that and can utilize this two kinds of technology simultaneously.That is, from be known as good news and be known as spam messages information can with the result combinations of cross validation or test while train, to give up which user with definite.
Refer now to Fig. 4, show the process flow diagram of the process 400 of the loyalty of confirming user's voting according to an aspect of the present invention.Process 400 is drawn 314 shown in Fig. 3 freely.402, send the known results test post to suspicious user (or all users).For example, test post can be injected and import mail into, and immediately manually with its classification, thereby database receives " known " result.Otherwise process 400 can be waited for, sends known results message until the third party.The user is allowed to same test post is put to the vote.404, the result who decides by vote is compared with known results.406, if user's voting is inconsistent, so can be in an appropriate time section manual examination (check) they are current and/or in the future and/or classification (408) in the past, express consistance and reliability until it.Perhaps, can discount or remove their current or following or classification in the past.At last, these users can be removed from poll in the future.But,, these users can be considered as believable so 410 if their voting result is consistent with test message results really.Process turns back to Fig. 3 412, to determine that expectation is to the affirmation technology of next group suspicious user with which kind of type.
The 4th kind of method (not shown) of assess user reliability is initiatively study.In the active learning art, be not picked at random message.On the contrary, feedback system can be estimated the useful degree of message to system.For example, if filtrator returns the probability of spam, then can preferentially select when front filter classify least definitely message be used for poll, that is, its spam probability is near those message of 50%.The another kind of method of selecting message is to determine the O-level of message.Message is common more, and it is just useful more for poll so.Unique useful degree of message is lower, because their O-level are lower.Can use initiatively study by the confidence level of utilizing existing filtrator, the O-level of utilizing the characteristic information and the setting of the existing filtrator of utilization or the confidence level (for example, first degree of confidence) of content.Also have such as the known trustee's inquiry of the technician in machine learning field (query-by-committee) and wait other initiatively learning art, can use in these technology any.
Refer now to Fig. 5, show the process flow diagram of the process 500 in the twit filter training that the feedback of the honey jar except that user feedback is attached to according to an aspect of the present invention.Honey jar be known who should be to the e-mail address of its send Email.For example, the e-mail address of certain new establishment can be maintained secrecy, and only reveal to selected several body (502).Also can be publicly but with the invisible restrictive one of people with its open (for example, it is linked as mail, is placed on the white background) with white font.Honey jar is particularly useful in the dictionary attack of spammer.In dictionary attack, spammer is attempted to very a large amount of addresses email, may be all addresses in the dictionary, the perhaps address of the word from the address to producing, or be used to find the similar techniques of effective address.Send to any Email (504) of honey jar or be not that any Email (506) from some selected individualities is regarded as spam (508).Also can e-mail address and suspect merchant is signatory.Therefore, any Email of receiving from this businessman has been regarded as mail (510), but all other mails are regarded as spam.Can train twit filter (512) in view of the above.In addition, judge that this suspect merchant sells or revealed user's information (for example, e-mail address) at least to the third party.Can repeat this process to other suspicious businessman, and the generation tabulation warns the user that their information may be distributed to spammer.These only are to obtain several in the technology that sends to Email honey jar, that can be considered as spam safely.In force, also have other replacement method to obtain and send to Email honey jar, that can be considered as spam safely.
Because honey jar is the fine source of spam, but the no good source of legitimate mail, so can will train new twit filter from the data of honey jar with from the data of feedback loop system (Fig. 1) are combined.Can carry out different weightings to mail from separate sources or different classification.For example, if having 10 honey jars and 10 that 10% the polled user of mail is arranged, then can expect from 10 times of the spams of honey jar to spam from poll.Therefore, in order to remedy this difference, can be to carrying out 10 times or 11 times from the legitimate mail of poll to the weighting of spam.Perhaps, optionally reduce the weight of honey jar data.For example, about 50% user mail has been a mail, and about 50% is spam.The spam of equivalent is transferred in the honey jar.Therefore, seeming honey jar has 100% spam, and is sampled all, but not only 10%.For in the system of combination with the become reconciled training recently of mail of correct spam, the honey jar data are reduced by 95% weight, and with the weight of user's spam reduction by 50%, to cause the overall ratio of 1:1.
Other sources of spam report comprise that seat participant not is included in the user in the feedback loop system.For example,, " report spam " button that can use all users can be arranged, report the spam that has passed through filtrator for all mails.These data can combine with the data from feedback loop system.Once more, can reduce the weight in this spam source, or carry out different weightings, because it may be that deviation or incredible is arranged in all fields.Also should carry out weighting again, the fact that can report by " being reported as spam " button with the mail that only is not filtered of reflection.
Except twit filter, guard filter can be created and use to feedback loop system.Guard filter utilized the affirmation and negation mail features both.For example, the mail from welcome online merchants is almost always good.Aspect certain of the mail of spammer by the businessman that imitation is good in its spam, come this system of malicious exploitation.Another example is that the spammer passes through to send a small amount of good mail via the IP address, comes the willful deceit feedback system.Feedback cycle association has been a mail with this classification of mail, and this moment, spammer begins from same IP address transmission spam.
Therefore, guard filter is noticed on the basis of historical record data, compares with this system's custom, receives certain specific positive feature of dramatic growth.Therefore this message is suspected by this system that makes, and it is isolated before maybe this mail being labeled as spam selecting to send to this mail, until having obtained enough poll results.Guard filter also can used when new IP address gets the mail, and to this new IP address, unknown or uncertain this mail is that spam also is non-spam, and still is unknown in a bit of time.Can carry out with some kinds of methods and isolate, comprise temporarily mail being labeled as spam and it is moved on to Junk E-Mail folder or it not being sent to the user or be stored to somewhere not descried.Can be to isolating: can suppose to help to make correct decision-making from the additional information of poll near the message of twit filter threshold value.Also can when receiving a lot of similar message, isolate: can send some message and carry out poll, and the filtrator of training again can be used for classifying messages correctly for feedback cycle.
Except making up filtrator, can also utilize as described in this article feedback loop system that it is assessed.That is, can adjust the parameter of twit filter as required.For example, train up certain filtrator midnight yestereve.After midnight, get and enter data of database and determine the error rate of twit filter and user classification under comparing.In addition, feedback cycle can be used for judging the sure and capture rate of vacation of twit filter.For example, desirable user's voting, and make mail pass a potential filtrator, to determine certainly false and capture rate.This information can be used for adjusting and optimizing this filtrator immediately.By make up several each all use different the setting or the filtrator of algorithm, can be manually or from different parameter setting of dynamic test or different algorithms, thus obtain the sure and capture rate of minimum vacation.Therefore, can compare each result to select preferably or optimum filter parameter.
Can utilize feedback cycle make up and fill those always by voting for spam or always be the IP address of good mail etc. or the tabulation of territory or URL for good mail or at least 90% by voting by voting.These tabulations can be used for carrying out Spam filtering with other method.For example, at least 90% quilt voting can be used for making up the address black hole lists of not accepting from the Email of its transmission for the IP address list of spam.Feedback cycle also can be used for stopping the number of the account of spammer.For example, send spam if the specific user of ISP seems, then this ISP can be notified automatically.Similarly, will be responsible for for a large amount of spams if special domain seems, then the email provider in this territory can be notified automatically.
The some kinds of architectures that can be used for realizing this feedback loop system are arranged.Described in Fig. 7, a kind of example architecture is based on server, and selection course takes place when the mail arrives e-mail server.Described in Fig. 6, a kind of architecture of replacement is based on client computer.In feedback cycle based on client computer, polling message can be used for improving the performance of personalized filter, perhaps, and herein in the exemplary realization shown in, this information can be sent to shared thesaurus as the training data that is used for sharing filtrator (for example, the company's scope or the whole world).The architecture that should be appreciated that the following stated is exemplary, and can comprise add-on assemble and the feature of not describing herein.
Get back to Fig. 6 now, show exemplary universal block diagram based on the feedback cycle technology in the architecture of client computer.Network 600 is provided (also has been designated as client computer so that Email is to and from one or more client computer 602,604 and 606 1, client computer 2... client computer N, wherein N is the integer more than or equal to 1) between communication.This network can be such as global communications network such as the Internet (GCN), or WAN (wide area network), LAN (LAN (Local Area Network)) or any other network configuration.In this specific implementation, SMTP (Simple Mail Transfer protocol) gateway server 608 and network 600 interfaces are to provide SMTP service to LAN610.Be placed in e-mail server 612 and gateway 608 interfaces on the LAN610 in the operation, with the Email that imports into and spread out of of control and processing client 602,604 and 606.This type of client computer 602,604 and 606 also is placed in LAN
On 610, so that the mail service that provides on it to be provided at least.
Client computer 1602 comprise the CPU (central processing unit) (CPU) 614 of controlling client process.CPU 614 can be made up of a plurality of processors.CPU 614 carries out about being provided at any instruction of above-described one or more data aggregation/feedback functions.These instructions comprise, but be not limited to, coded order, they carry out above-mentioned basic feedback cycle method at least, at least any or all method that can be used in combination with it, these methods are used to solve the selection of client computer and message, polling message is revised, data keep, client computer reliability and class validation, again weighting is from the data that comprise a plurality of sources such as feedback cycle, twit filter is optimized and is adjusted, guard filter, the establishment of spam tabulation, and to its automatic notice of the spammer of ISP and email provider separately.Provide user interface 616 so that communicate by letter with Client OS, thereby client computer 1 can be put to the vote with the visit Email with to polling message alternately with CPU 614.
Can select to be used for poll by message selector switch 620 from the sampling of the client communication of server 612 retrievals.If expection recipient (client computer) has agreed to participate in before, then choose and revise message to be used for poll.Message modification device 622 is a polling message with message modification.For example, according to the description of message modification provided above, message modification can be become comprise voting instruction and voting button and/or link.Voting button and/or link are to realize by the user interface 616 of revising client email software.In addition, open or download message for before client computer 602 checks, any virus in the message modification device 622 removable message (poll and non-polling message).
In one implementation, the user of the client computer 602 of antagonism spam only sees each message once, and wherein some message is labeled as polling message especially, and comprises voting button etc.In this realization, the user of spam opposing client computer 602 can see some message twice, wherein once is normal messages, and another time is polling message.These available some kinds of methods realize.For example, can return polling message and it is stored in the polling message storage to server 612.Perhaps, client computer 602 can be stored additional message in e-mail server 612.Perhaps, client computer 602 can show each message twice to the user, once is normal messages, once is amended form.
Poll result 626 can be sent to CPU 614, is sent to database 630 subsequently, depends on the ad hoc arrangement of client computer feedback system structure, database 630 can be configured to store the data from a client computer or an above client computer.The information of central database 630 storage polling message, poll result and each client user.Can use associated component to analyze this type of information, such as credibility (for example, the user confirms 632) and other client computer statistic of determining poll frequency, client user.Especially when the reliability of client computer voting is suspected, can use the affirmation technology.Suspection may come to inconsistent number of times, the number of times of changing mind and to the analysis of the number of times of certain or some specific user's polling messages; Perhaps, can use the affirmation technology to each user.The data that are stored in any right quantity in the central database can be used for machine learning techniques 634, so that train new and/or improved twit filter.
Client computer 604 and 606 comprises and similar assembly mentioned above, to obtain and to train filtrator to the specific client personalization.Except described, polling message rinser (scrubber) 628 can be between CPU 614 and central database 630 interface, thereby can be because of some aspect that removes polling message such as a variety of causes such as data gathering, data compressions.Polling message rinser 628 can wash out the irrelevant part of polling message and the user profile of any non-expectation of being associated with it.
Refer now to Fig. 7,, show the exemplary feedback loop system 700 of being convenient to multi-user's login and obtaining polling data based on server according to feedback cycle technology of the present invention.Network 702 is provided (also has been designated as the user so that Email is to and from one or more users 704 1704 1, the user 2704 2..., and user N704 N, wherein N is the integer more than or equal to 1) between communication.Network 702 can be such as global communications network such as the Internet (GCN), or WAN (wide area network), LAN (LAN (Local Area Network)) or any other network configuration.In this specific implementation, SMTP (Simple Mail Transfer protocol) gateway server 710 and network 702 interfaces are to provide SMTP service to LAN712.Be placed in e-mail server 714 and gateway 710 interfaces on the LAN712 in the operation, with the Email that imports into and spread out of of control and process user 704.
System 700 provides the ability of multiple login, thereby for signing in to each different user generation user and message selection 716, message modification 718 and the message poll (720,722,724) of system 700.Therefore, provide user interface 726, it has presented the part of logon screen as the computer operating system bootup process, or according to desired user 704 can visit his or her import message into before a predetermined user's overview that is associated.Therefore, as first user, 7041 (users 1) when selecting access message, this first user 704 1Be generally the visit information of username and password form by input, sign in in the system via logon screen 728.CPU 730 handles this visit information and only visits first user's inbox position 732 to allow this user via messaging application (for example, Mail Clients).
When receiving on message server 714 when importing mail into, their are selected to be used for poll randomly, this means that in these message at least one is labeled to be used for poll.Whether check the expection recipient who is labeled message, also be the user of the antagonism spam of appointment to determine among these recipients any one.Can on any other suitable assembly of message server 714 or system 700, safeguard recipient's attribute of indication this type of information.In case determined which also is the spam soldier among the expection recipient, can with they separately mail copy and send to central database 734 about any out of Memory of this mail transaction and be used for storage.Message modification device 718 is revised with the method for above-described any amount and is marked as the message that is used for poll.The selected message that is used for poll can be special-purpose to user 704 also.For example, user 704 can indicate and have only the message of some type to can be used for poll.Because this can cause data sampling devious, so these class data can come weighting again with respect to other client data, to alleviate the out-of-proportion training dataset of structure.
Also can be at this moment or any virus scan of carrying out polling message At All Other Times before user 704 downloads and/or opens polling message.In case revised message by rights, soon it is sent to and is designated as inbox 1732, inbox 2736 and inbox NEach user of 738 inbox, can open it there is used for poll.For ease of polling procedure, each polling message comprises two or more voting buttons or link, when the user chooses these buttons or link, promptly generates the information that relates to this polling message and poll result.Can revise the text of each polling message, button will be decided by vote or link is attached to wherein.
The message poll result who comprises any information (for example, polling message or the ID that is associated with it, user property) that is produced by classification (is designated as the message poll 1720, message poll 2722 and the message poll N724) send to central database 734 via the network interface on the LAN 712 740.Central database 734 can be stored from each user's poll and user profile (720,722,724), makes up or optimizes new and/or improved twit filter 742 to be applied to machine learning techniques.But the reason for privacy and/or safety before information is sent to central database 714, can remove from this information or the stripping machine confidential information.Also the information aggregation that user 704 can be generated via poll is in statistics.Thereby, used less bandwidth to send this information.
But then can be such as on ongoing basis such as new filtrator time spent, by specific request or the twit filter 742 that automatically will newly train be distributed to other server (not shown) and with the client email software (not shown) of LAN 712 interfaces.For example, can it release up-to-date twit filter, and/or make it can be used for downloading via the website from trend.When having generated new training dataset and made up the twit filter of renewal, can be according to the data set (for example, obtaining and/or be used to train the information of filtrator) that give up the service time of data or discount is older before.
Consider now the situation of replacing, the tissue of wherein being devoted to resist spam can be used the filtrator of being shared by the tissue of many different use filtrators.In one aspect of the invention, filter provider also is very large-scale E-mail service (for example, paying and/or free email accounts) supplier.This filter provider is selected also to use some data of using the tissue of filtrator from some, rather than depends on the Email from its oneself tissue exclusively, to have caught the scope of mail and spam better.Feedback loop system as mentioned also can be used for so inter-organization situation with the form of server or client architecture.Be called " inside " tissue with assembling with filter provider, and the assembly of one of tissue that will reside in the use filtrator of participation is called " outside " from the data of the tissue of different use filtrators from its oneself user.Generally speaking, striding organization system comprises such as, but not limited to Hotmail etc. and is positioned at the mail database server (inside) of filter provider and can resides in one or more message servers (outside) such as message server of one or more independent companies such as those.In this case, inner mail database server is also stored the email feedback from its oneself client's essence.According to this aspect of the invention, can be (for example based on the information that is stored in internal database, free email/message communicating on Hotmail or the MSN server) and be stored in information in the one or more external data bases that are associated with each external server, generate training dataset.For example, can be used for machine learning techniques via the information of safeguarding on the external data base being sent to internal server such as networks such as the Internets.Finally, can be used for the conventional garbage mail filter of training new twit filter and/or improvement to be positioned at outside (for example, in each company) or to be associated from the data of external data base with internal mail server.
Data from one or more external data bases should comprise polling message, poll result (classification), user information/properties, and each user, every group of user or average at least one in the voting statistics of each company.The voting statistics is convenient to determine the reliability of the information that generated by each company, and the deviation that alleviates external data.Therefore, can perhaps be different from the weighting of one or more other external data bases to data weighting again from one or more external data bases (company).In addition, can use the reliability and the credibility of coming the test for external entity with described similar affirmation technology above.
For example, for the purpose of corporate security, privacy and secret, can will wash, abridge and/or concentrate from its primitive form by information or data that the Internet sends to e-mail server from each company.Primitive form can be safeguarded on each external data base, and/or handle according to the preference of each company.Therefore, e-mail server or any other internal mail server only receive that to generate training data for information about necessary, such as spam classification, sender territory, sender's title, be categorized as the content etc. of the message of spam.
Refer now to Fig. 8, show exemplary striding and organize feedback system 800, wherein internal database server and Outside Mail server can be via network service and swap data library informations, so that be created on the training dataset that is used for making up improved twit filter in the machine learning techniques.System 800 comprises at least one external message server 802 (for example, being associated with at least one company) and internal database server 804.Owing to stride the characteristic of organization system, external server 802 and internal e-mail server 804 are safeguarded its oneself database respectively.That is, e-mail server 804 with also can be used for training the internal database 806 of new spam filters 808 to be associated.Similarly, external server 802 with can be used for training at least one new twit filter 812 and be associated with respect to the external data base 810 that e-mail server 804 is positioned at inner twit filter 808.Therefore, the information that is stored on the external data base 810 can be used for training the twit filter 808 that is positioned on the e-mail server.
Provide GCN 814 so that information is to and from communicating by letter of internal e-mail server 804 and one or more external message server 802.The external server assembly of striding organization system with move based on the similar mode of the feedback loop system (for example, above-mentioned Fig. 7) of server.For example, message server 802, external data base 810 and filtrator 812 can be positioned on the LAN 815.In addition, provide user interface 816, it presents the part of logon screen 818 as the bootup process of computer operating system, or as requested, user 704 addressable his or her import message into before the predetermined user's overview that is associated.
In this system based on server, in order to utilize available mail service, one or more users (are designated as the user 1820, user 2822, user N824) can sign in in the system simultaneously.In force, as first user, 820 (users 1) when selecting access message, this first user 820 is generally the visit information of username and password form by input, signs in in the system via logon screen 818.CPU 826 handles this visit information and only visits first user's inbox position 828 to allow this user via messaging application (for example, Mail Clients).
When receiving that on message server 802 when importing mail into, message is decided to be the target of poll randomly or especially.Whether this type of expection recipient and spam soldier user list that is decided to be the message of target is compared before message is used for poll can selecting, also be the user of the antagonism spam of appointment to determine among these recipients any one.Can on any other appropriate assembly of message server 802, database 810 or system 800, safeguard recipient's attribute of indication this type of information.In case determining among the expection recipient which also is the spam soldier, promptly selects message to be used for poll, and sends the copy of polling messages and any out of Memory that relates to mail transaction to database 810.
Message modification device 830 can above-described any amount method revise the selected message that is used for poll.In force, can distribute unique identifier (ID) and it is stored in the database 810 to each polling message, each spam soldier and/or each poll result.As previously mentioned, the selected message that is used for poll can be selected at random, can be special-purpose for relative users (820,822 and 824) perhaps.For example, user 1820 only can indicate, and the message of some type can be used for poll (for example, from the outside message that sends of company).To the data that generate from this type of particular message weighting and/or discount again, obtain data sampling devious to alleviate.
Also can be at this moment or any virus scan of carrying out polling message At All Other Times before user 704 downloads and/or opens polling message.In case revised message by rights, soon it is sent to and is designated as inbox 1828, inbox 2832 and inbox NEach user of 834 inbox, can open it there is used for poll.For ease of polling procedure, each polling message comprises two or more voting buttons or link, when the user chooses these buttons or link, promptly generates the information that relates to this polling message and poll result.Can revise the text of each polling message, button will be decided by vote or link is attached to wherein.
The message poll result who comprises any information (for example, polling message or the ID that is associated with it, user property) that is produced by classification (is designated as the message poll 1720, message poll 2722 and the message poll N724) send to central database 810 via the network interface on the LAN815 842.Central database 810 can be stored from each user's poll and user profile, for making up or optimize machine learning techniques new and/or improved twit filter 812,808 and use being used for after a while.
For example, for the reason of privacy, each company may want peeling off key message by GCN 814 before its oneself database 810 and/or email database 806 send polling messages and/or user profile.A kind of method is only to provide the feedback to spam messages to database (806 and/or 810), thereby has got rid of the feedback to legitimate mail.Another kind method is the part subclass that only provides such as the information on the legitimate mail such as sender and sender IP address.Another kind method is, for the message of choosing, is labeled as by the user such as those and is labeled as badly by filtrator, or opposite message before sending it to filtrator, requires the user to permit clearly.Any or its combination in these methods is convenient to safeguard the privacy of confidential information of the client computer of participation, constantly provides data to train twit filter (808 and/or 812) simultaneously.
Confirm that such as user such as described scheme above scheme also can be applicable to each company and in-company each user.For example, the user can individually stand cross-validation technique, and wherein the classification of suspicious user is got rid of from filter training.Filtrator uses and trains from all the other user's data.Housebroken filtrator travels through the message from the user who is excluded subsequently, to determine its these message of how classifying.If inconsistent amount surpasses a threshold value, this suspicious user is regarded as insincere so.Following message classification from insincere user can carry out manual examination (check) before by database and/or filtrator acceptance.Otherwise, can from poll in the future, remove these users.
Refer now to Fig. 9, be used to realize that the exemplary environments 910 of various aspects of the present invention comprises computing machine 912.Computing machine 912 comprises processing unit 914, system storage 916 and system bus 918.System bus 918 will include but not limited to that the system component of system storage 916 is coupled to processing unit 914.Processing unit 914 can be any in the various available processors.Dual micro processor and other multiprocessor architecture also can be used as processing unit 914.
System bus 918 can be any in the some kinds of bus structure, comprise memory bus or Memory Controller, peripheral bus or external bus, and/or use any local bus in the various available bus architectures, these architectures comprise, but be not limited to 11 buses, ISA(Industry Standard Architecture), MCA (MCA), the ISA (EISA) of expansion, intelligent driver electronic equipment (IDE), VESA local bus (VLB), peripheral component interconnect (PCI), USB (universal serial bus) (USB), advanced graphics port (AGP), PCMCIA (personal computer memory card international association) bus (PCMCIA), and small computer system interface (SCSI).
System storage 916 comprises volatile memory 920 and nonvolatile memory 922.Comprise such as when starting, helping basic input/output (BIOS) to be stored in the nonvolatile memory 922 in that computing machine 912 inner each interelement transmit the basic routine of information.And unrestricted, nonvolatile memory 922 can comprise ROM (read-only memory) (ROM), programming ROM (PROM), electrically programmable ROM (EPROM), electrically-erasable ROM (EEROM) (EEPROM) or flash memory as example.Volatile memory 920 comprises the random-access memory (ram) of taking on the External Cache storer.As example and unrestricted, RAM can have various ways, such as synchronous random access memory (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDR SDRAM), enhancement mode SDRAM (ESDRAM), synchronization link DRAM (SLDRAM), and direct memory bus RAM (DRRAM).
Removable/not removable, volatile/nonvolatile computer storage media that computing machine 912 also comprises.For example, Fig. 9 illustrates disk storage 924.Disk storage 924 includes but not limited to, as the equipment of disc driver, floppy disk, tape drive, Jaz driver, Zip drive, LS-100 driver, flash card or memory stick and so on.In addition, disk storage 924 can comprise storage medium separately or make up with other storage mediums, other storage mediums comprise, but be not limited to, can write down driver (CD-R driver), CD recordable drive (CD-RW driver) or digital versatile disc ROM driver CD drive such as (DVD-ROM) such as CD ROM equipment (CD-ROM), CD.Be connected to system bus 918 for ease of disk storage device 924, use such as removable or not removable interfaces such as interfaces 926 usually.
Should be appreciated that Fig. 9 has described the software of taking on intermediary between the basic computer resources of user and description in suitable operating environment 910.This type of software comprises operating system 928.Can be stored in that operating system 928 in the disk storage 924 is used to control and the resource of Distribution Calculation machine system 912.System application 930 has utilized operating system 928 by being stored in the program module 932 in the system storage 916 or in the disk storage 924 and the management of 934 pairs of resources of routine data.Should be appreciated that the present invention can make up with various operating systems or its realizes.
The user arrives in the computing machine 912 by input equipment 936 input commands or information.Input equipment 936 comprises, but be not limited to, such as positioning equipment, keyboard, microphone, operating rod, game mat, satellite dish, scanner, TV tuner card, digital camera, Digital Video, IP Camera or the like such as mouse, tracking ball, contact pilotage, touch pads.These and other equipment is linked processing unit 914 via interface port 938 by system bus 918.Interface port 938 comprises for example serial port, parallel port, game port and USB (universal serial bus) (USB).Output device 940 uses the port of some and input equipment 936 same types.Thereby for example USB port can be used for being provided to the input of computing machine 912, reaches from computing machine 912 output informations to output device 940.O adapter 942 is provided, has in other output devices 940 to be shown in that some need the output device 940 of private adapter such as monitor, loudspeaker and printer etc.As example and unrestricted, o adapter 942 comprises, a kind of video card and sound card that is connected means between output device 940 and the system bus 918 is provided.Should be noted that such as remote computer 944 waits other equipment and/or device systems that input and fan-out capability are provided simultaneously.
Computing machine 912 can use logic such as one or more remote computers such as remote computers 944 and be connected in the networked environment and operate.Remote computer 944 can be personal computer, server, router, network PC, workstation, the electrical equipment based on microprocessor, peer device or other common network node or the like, and generally includes with respect to computing machine 912 described many or whole elements.For the sake of simplicity, only memory storage devices 946 is shown with remote computer 944.Remote computer 944 logically is connected to computing machine 912 by network interface 948, then via communicating to connect 950 physical connections.Network interface 948 comprises such as Local Area Network and wide area network communication networks such as (WAN).Lan technology comprises Fiber Distributed Data Interface (FDDI), Copper Distributed Data Interface (CDDI), Ethernet/IEEE1102.3, token ring/IEEE1102.5 or the like.The WAN technology includes, but not limited to point-to-point link, the circuit-switched network as ISDN (Integrated Service Digital Network) and variant thereof, packet switching network and Digital Subscriber Line (DSL).
Communicate to connect the hardware/software that 950 fingers are used for network interface 948 is linked bus 918.Although clear for explanation, will communicate to connect 950 and be shown in computing machine 912 inside, it also can be positioned at computing machine 912 outsides.It only is illustrative purpose, be connected to network interface 948 necessary hardware/softwares and comprise inside and outside technology, such as the modulator-demodular unit that comprises routine call level modulator-demodular unit, cable modem and DSL modulator-demodular unit, ISDN adapter and Ethernet card.
Figure 10 be can with the schematic block diagram of the mutual example calculation environment 1000 of the present invention.System 1000 comprises one or more client computer 1010.Client computer 1010 can be hardware and/or software (for example, thread, process, computing equipment).System 1000 also comprises one or more servers 1030.Server 1030 also can be hardware and/or software (for example, thread, process, computing equipment).For example, server 1030 can hold thread, carries out conversion with the application of the invention.1030 a kind of possible communicating by letter of client computer 1010 and server can be the forms that is suitable for the packet that sends between two or more computer processes.System 1000 comprises the communications framework of communicating by letter 1050 that can be used to be convenient to client 1010 and 1030 of servers.Be connected to the one or more client data storages 1060 that can be used for storing to the information of client computer 1010 this locality in client computer 1010 operations.Similarly, link the one or more server data stores 1040 that can be used for storing to the information of server 1030 this locality in server 1030 operations.
Top description comprises example of the present invention.Certainly, can not describe each combination that can expect of each assembly or method, but those of ordinary skill in the art can be appreciated that many other combinations of the present invention are possible with conversion for description the present invention.Therefore, the present invention is intended to comprise spirit and interior all these type of changes, modification and the variant of category that falls into appended claims.In addition, use in embodiment or claims on the meaning that term " comprises ", this type of term intention has pardon as term " comprises ", is explained during as " comprising " transition speech in being used as claims.

Claims (42)

1. be convenient to regard to preventing spam, to come system that project is classified for one kind, it is characterized in that, comprising:
Be used to receive the device of one group of described project;
Be used to discern the expection recipient of described project and a subclass of described project is labeled as the device of poll project, described poll project is corresponding to recipient's subclass of the user who is known as the antagonism spam; And
Utilize the feedback assembly of machine learning techniques, be used to receive the user that relates to described antagonism spam and be used to train twit filter and fill the spam tabulation to the information of the classification of described poll project and based on the information of user's input of described antagonism spam and machine learning techniques information with described classification;
Wherein, described project comprises in Email and the message at least a.
2. the system as claimed in claim 1 is characterized in that, the described device that is used for receiving one group of described project is any one of e-mail server, message server and E-mail client.
3. the system as claimed in claim 1 is characterized in that, described poll project comprises all items of being received.
4. the system as claimed in claim 1 is characterized in that, described recipient's subclass comprises all recipients.
5. the system as claimed in claim 1 is characterized in that, described recipient's subclass is selected at random.
6. the system as claimed in claim 1 is characterized in that, described poll project is subject at least one in the following terms and conditions:
The quantity of each user's selected item;
Each user is in the quantity of the selected item of each time period; And
To carry out the probability of mark corresponding to the project of known users.
7. the system as claimed in claim 1 is characterized in that, each of described poll project all is assigned with a unique ID, and described unique ID is corresponding in the content of described poll project and described poll project any one.
8. the system as claimed in claim 1 is characterized in that, also comprises the device of revising described poll project.
9. system as claimed in claim 8 is characterized in that described poll project comprises the summary of poll project, and described summary comprises in the first few lines of theme, date, Message-text and described Message-text at least one.
10 systems as claimed in claim 9, it is characterized in that, described poll project comprises voting instruction any one voting button and link with at least two voting buttons and in linking, described at least two voting buttons and link are corresponding at least two corresponding classification of poll project, so that by the user poll project is classified.
11. the system as claimed in claim 1, it is characterized in that, the central database that also comprises canned data and data, described information and data relate to user property, the contents of a project that are associated with the poll project and attribute, user's classification and voting statistics, each user's wheel and inquire about the frequency analysis data of the poll of each each time period of user, spam tabulation, legitimate mail tabulation and black hole lists.
12. the system as claimed in claim 1, it is characterized in that, described system distributes in the company of antagonism spam more than, thereby the information from the described classification of each company is sent to the central database that links to each other with each company, wherein, the confidential information in the information of described classification is removable.
13. the system as claimed in claim 1 is characterized in that, also comprises being used for test subscriber's reliability and credible user's class validation device.
14. system as claimed in claim 13 is characterized in that, described user's class validation device can be applied to one or more users that suspected.
15. the system as claimed in claim 1 is characterized in that, described feedback assembly receives and relates to user feedback, honey jar feedback and the optional user recipient feedack of receiving project.
16. be convenient to regard to preventing spam, to come method that message is classified for one kind, it is characterized in that, comprising:
Receive one group of described message;
Discern the expection recipient of described message;
A subclass of described message is labeled as polling message, and described polling message is corresponding to recipient's subclass of the user who is known as the antagonism spam;
Reception relates to the information of the user of described antagonism spam to the classification of polling message; And
Be used to train twit filter and fill the spam tabulation based on the information of described classification and machine learning techniques information described classification.
17. method as claimed in claim 16 is characterized in that, the described recipient's subclass that is known as the user of antagonism spam is carried out following at least one by each recipient and is determined:
Decision participates in providing feedback to message so that train new twit filter;
Determine passively that by not determining to withdraw from participation provides the feedback to message;
Email and messenger service that the message server that participates in of serving as reasons provides are paid; And
Offer email accounts to the message server that participates in.
18. method as claimed in claim 16 is characterized in that, described polling message is limit by one or more poll restrictions.
19. method as claimed in claim 16 is characterized in that, also comprises revising described polling message.
20. method as claimed in claim 19 is characterized in that, revises polling message and comprises following at least one of execution:
Described polling message is moved on to the independent file that is used for polling message;
Revise " certainly " address of described polling message;
Revise the subject line of described polling message;
On described polling message, use the poll icon to identify; And
Use unique color to identify described polling message.
21. method as claimed in claim 16 is characterized in that, also is included in described polling message and is downloaded and is used for before the poll its Scan for Viruses.
22. method as claimed in claim 16, it is characterized in that, also be included as each described polling message and make a copy the same during with original receiving, thereby make each user among the user who resists spam can receive the triplicate of the amended poll form of the first authentic copy of primitive form of described message and described message.
23. method as claimed in claim 16, it is characterized in that, also comprise described housebroken twit filter is distributed to one or more servers, described distribution is automatically to take place and/or take place by request, and described request is from least one of the announcement that is used for downloading on email message and the website.
24. method as claimed in claim 16, it is characterized in that, training described twit filter and filling described spam tabulation is to be used based on classify feedback and optional data that generated by one or more additive sources of user by machine learning techniques to carry out, and described one or more additive sources comprise honey jar, the non-user of recipient classify feedback and active learning art.
25. method as claimed in claim 24, it is characterized in that, come pro rata weighting again by the data that described one or more additive sources generate with respect to the type of the data that generate by this source and with respect to the information of described classification, so that obtain the bias free sampling of data.
26. method as claimed in claim 16 is characterized in that, also comprises:
Message one or more positive feature are separately imported in supervision into;
Determine the frequency of the positive feature received;
Judge based on historical data whether the frequency of the positive feature of receiving surpasses a threshold frequency at least in part; And
Isolation is corresponding to the suspect message of the one or more positive feature that surpass described threshold frequency, until there being other grouped data to can be used for judging whether suspect message is spam.
27. method as claimed in claim 26 is characterized in that, the positive feature of being received is the information about the sender, comprises in sender IP address and the territory at least one.
28. method as claimed in claim 26 is characterized in that, isolates suspect message and is by in the following action at least one and carry out:
Described suspect message is labeled as spam and it is moved on to Junk E-Mail folder temporarily;
Delay sends to described suspect message to the user, can use until other grouped data; And
Described suspect message is stored in the sightless file of user.
29. method as claimed in claim 16 is characterized in that, comprises that also the vacation of definite described twit filter is affirmed and capture rate, so that optimize described twit filter, wherein, determines that vacation is affirmed and capture rate comprises:
Use training dataset to train described twit filter, described training dataset comprises the first group polling result;
Utilize the user feedback second group polling message of classifying, to produce the second group polling result;
Make the described second group polling message pass described housebroken twit filter;
Described second group polling result and described housebroken twit filter result are compared, affirm and capture rate with the vacation of determining described filtrator, thereby assess and adjust filter parameter according to optimum filter capability.
30. method as claimed in claim 29, it is characterized in that, make up an above twit filter, its each all have different parameters, and each all uses same training dataset to train, thereby with the vacation of each twit filter certainly and the vacation of capture rate and at least one other twit filter is sure and capture rate compares, think that Spam filtering determines optimized parameter.
31. method as claimed in claim 16, it is characterized in that, also comprise and use the extra message groups of importing into to make up improved twit filter, the subclass of described additional message group will be subjected to poll to produce the information of the new classification relevant with the described improved twit filter of training, wherein, the information of the previous classification that obtains obtains it before at least in part based on how long and comes its weighting again.
32. method as claimed in claim 16 is characterized in that, comprises that also the information of using described classification makes up the legitimate sender tabulation.
33. method as claimed in claim 16 is characterized in that, comprises that also the information of using described classification is so that termination spammer's number of the account.
34. method as claimed in claim 33 is characterized in that, comprises that also identification using the spammer of ISP and send from this ISP of trend notice spam.
35. method as claimed in claim 33 is characterized in that, comprises that also identification will be send the territory that spam is responsible for, and automatically at least one the notice spam in the ISP in the email provider in this territory and this territory sends.
36. method as claimed in claim 16, it is characterized in that, comprise that also with at least one is distributed in mail server and the client email software any one in the tabulation of described twit filter and described spam, wherein, described distribution comprises following at least one:
On the website, put up notice, can be used for downloading to notify the tabulation of described twit filter and spam;
Release described twit filter and the tabulation of described spam from trend mail server and client email software; And
Manually release described twit filter and the tabulation of described spam to mail server and client email software.
37. method as claimed in claim 16 is characterized in that, described method also comprises reliability and the credible cross validation step of being convenient to verify that the user classifies, and described step comprises:
Get rid of one or more users' of being suspected classification from the data that are used for training twit filter;
Use all other available users to classify and train described twit filter; And
Make the described user's of being suspected polling message pass described housebroken twit filter, compare with the described user's of being suspected classification determining, its described message of can how classifying.
38. method as claimed in claim 37 is characterized in that, also comprises carrying out following at least one:
To carrying out discount, be confirmed as credible until this user by being confirmed as the existing and classification in the future that incredible user provides;
Give up by being confirmed as the existing classification that incredible user provides; And
Described insincere user is removed from poll in the future.
39. method as claimed in claim 16 is characterized in that, described method also comprises is convenient to verify reliability and the credibility of user in classifying, and to train the step of twit filter via feedback loop system, described step comprises:
With a sub-set identifier that resists the user of spam is suspicious user;
Provide one or more test posts to be used for poll to described suspicious user with known results; And
Determine whether described suspicious user is complementary with described known classification to the classification of described one or more test posts, to determine the reliability of described user's classification.
40. method as claimed in claim 39 is characterized in that, user's the subclass that is identified as the described antagonism spam of suspicious user comprises all users.
41. method as claimed in claim 39 is characterized in that, described test post is to be known as spam to become reconciled at least aly in the mail, and is injected into by described feedback loop system and imports in the mail flows and be sent to described suspicious user.
42. method as claimed in claim 39 is characterized in that, the message that is used for poll that described suspicious user is received to train described spam sorter with correct classification, is discerned insincere user by system manager's manual classification.
43. method as claimed in claim 39 is characterized in that, also comprises at least one in the following action:
To carrying out discount, be confirmed as credible until this user by being confirmed as the existing and classification in the future that incredible user provides;
Give up by being confirmed as the existing classification that incredible user provides; And
Described insincere user is removed from poll in the future.
CNB2004800037693A 2003-03-03 2004-02-25 Feedback loop for spam prevention Expired - Fee Related CN100472484C (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US10/378,463 US7219148B2 (en) 2003-03-03 2003-03-03 Feedback loop for spam prevention
US10/378,463 2003-03-03

Publications (2)

Publication Number Publication Date
CN1809821A CN1809821A (en) 2006-07-26
CN100472484C true CN100472484C (en) 2009-03-25

Family

ID=32926496

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2004800037693A Expired - Fee Related CN100472484C (en) 2003-03-03 2004-02-25 Feedback loop for spam prevention

Country Status (18)

Country Link
US (2) US7219148B2 (en)
EP (1) EP1599781A4 (en)
JP (1) JP4828411B2 (en)
KR (1) KR101021395B1 (en)
CN (1) CN100472484C (en)
AU (1) AU2004216772B2 (en)
BR (1) BRPI0407045A (en)
CA (2) CA2513967C (en)
CO (1) CO6141494A2 (en)
EG (1) EG23988A (en)
IL (2) IL170115A (en)
MX (1) MXPA05008303A (en)
NO (1) NO20053733L (en)
NZ (1) NZ541628A (en)
RU (1) RU2331913C2 (en)
TW (2) TWI331869B (en)
WO (1) WO2004079514A2 (en)
ZA (1) ZA200506085B (en)

Families Citing this family (293)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6252547B1 (en) 1998-06-05 2001-06-26 Decisionmark Corp. Method and apparatus for limiting access to signals delivered via the internet
US20030097654A1 (en) * 1998-06-05 2003-05-22 Franken Kenneth A. System and method of geographic authorization for television and radio programming distributed by multiple delivery mechanisms
US8566248B1 (en) 2000-08-04 2013-10-22 Grdn. Net Solutions, Llc Initiation of an information transaction over a network via a wireless device
US9928508B2 (en) 2000-08-04 2018-03-27 Intellectual Ventures I Llc Single sign-on for access to a central data repository
US7257581B1 (en) 2000-08-04 2007-08-14 Guardian Networks, Llc Storage, management and distribution of consumer information
US8010981B2 (en) 2001-02-08 2011-08-30 Decisionmark Corp. Method and system for creating television programming guide
US7849141B1 (en) * 2001-06-14 2010-12-07 Apple Inc. Training a computer storage system for automatic filing of data using graphical representations of storage locations
US7640305B1 (en) 2001-06-14 2009-12-29 Apple Inc. Filtering of data
US7913287B1 (en) 2001-06-15 2011-03-22 Decisionmark Corp. System and method for delivering data over an HDTV digital television spectrum
JP2003333096A (en) * 2002-05-08 2003-11-21 Nec Corp Incoming e-mail rejecting system, incoming e-mail rejecting method and incoming e-mail rejecting program
WO2003104947A2 (en) 2002-06-06 2003-12-18 Hardt Dick C Distributed hierarchical identity management
AU2003248736A1 (en) * 2002-06-25 2004-01-06 Abs Software Partners Llc System and method for online monitoring of and interaction with chat and instant messaging participants
US8046832B2 (en) * 2002-06-26 2011-10-25 Microsoft Corporation Spam detector with challenges
US7428580B2 (en) 2003-11-26 2008-09-23 Aol Llc Electronic message forwarding
US7590696B1 (en) 2002-11-18 2009-09-15 Aol Llc Enhanced buddy list using mobile device identifiers
WO2004077710A2 (en) * 2003-02-27 2004-09-10 Businger, Peter, A. Minimizing unsolicited e-mail based on prior communications
US7219148B2 (en) * 2003-03-03 2007-05-15 Microsoft Corporation Feedback loop for spam prevention
US7543053B2 (en) 2003-03-03 2009-06-02 Microsoft Corporation Intelligent quarantining for spam prevention
US20050091320A1 (en) * 2003-10-09 2005-04-28 Kirsch Steven T. Method and system for categorizing and processing e-mails
US20060168006A1 (en) * 2003-03-24 2006-07-27 Mr. Marvin Shannon System and method for the classification of electronic communication
US7680886B1 (en) * 2003-04-09 2010-03-16 Symantec Corporation Suppressing spam using a machine learning based spam filter
US7546348B2 (en) * 2003-05-05 2009-06-09 Sonicwall, Inc. Message handling with selective user participation
US20050108340A1 (en) * 2003-05-15 2005-05-19 Matt Gleeson Method and apparatus for filtering email spam based on similarity measures
US7484096B1 (en) 2003-05-28 2009-01-27 Microsoft Corporation Data validation using signatures and sampling
US7457791B1 (en) * 2003-05-30 2008-11-25 Microsoft Corporation Using invariants to validate applications states
US7272853B2 (en) * 2003-06-04 2007-09-18 Microsoft Corporation Origination/destination features and lists for spam prevention
US20040254988A1 (en) * 2003-06-12 2004-12-16 Rodriguez Rafael A. Method of and universal apparatus and module for automatically managing electronic communications, such as e-mail and the like, to enable integrity assurance thereof and real-time compliance with pre-established regulatory requirements as promulgated in government and other compliance database files and information websites, and the like
US7376652B2 (en) * 2003-06-17 2008-05-20 The Hayes-Roth Family Trust Personal portal and secure information exchange
US7882179B2 (en) * 2003-06-20 2011-02-01 Compuware Corporation Computer system tools and method for development and testing
US7519668B2 (en) * 2003-06-20 2009-04-14 Microsoft Corporation Obfuscation of spam filter
US7711779B2 (en) 2003-06-20 2010-05-04 Microsoft Corporation Prevention of outgoing spam
US8533270B2 (en) * 2003-06-23 2013-09-10 Microsoft Corporation Advanced spam detection techniques
US7051077B2 (en) * 2003-06-30 2006-05-23 Mx Logic, Inc. Fuzzy logic voting method and system for classifying e-mail using inputs from multiple spam classifiers
US20050015626A1 (en) * 2003-07-15 2005-01-20 Chasin C. Scott System and method for identifying and filtering junk e-mail messages or spam based on URL content
US20050015455A1 (en) * 2003-07-18 2005-01-20 Liu Gary G. SPAM processing system and methods including shared information among plural SPAM filters
US8214437B1 (en) 2003-07-21 2012-07-03 Aol Inc. Online adaptive filtering of messages
US7653693B2 (en) * 2003-09-05 2010-01-26 Aol Llc Method and system for capturing instant messages
US7814545B2 (en) 2003-07-22 2010-10-12 Sonicwall, Inc. Message classification using classifiers
US20050065906A1 (en) * 2003-08-19 2005-03-24 Wizaz K.K. Method and apparatus for providing feedback for email filtering
GB2405229B (en) * 2003-08-19 2006-01-11 Sophos Plc Method and apparatus for filtering electronic mail
US8200761B1 (en) * 2003-09-18 2012-06-12 Apple Inc. Method and apparatus for improving security in a data processing system
US9338026B2 (en) * 2003-09-22 2016-05-10 Axway Inc. Delay technique in e-mail filtering system
US7840646B2 (en) * 2003-10-08 2010-11-23 Yahoo! Inc. Learned upload time estimate module
US7181498B2 (en) * 2003-10-31 2007-02-20 Yahoo! Inc. Community-based green list for antispam
US7373385B2 (en) 2003-11-03 2008-05-13 Cloudmark, Inc. Method and apparatus to block spam based on spam reports from a community of users
US7181764B2 (en) * 2003-11-04 2007-02-20 Yahoo! Inc. System and method for a subscription model trusted email database for use in antispam
US20050102638A1 (en) * 2003-11-10 2005-05-12 Jiang Zhaowei C. Navigate, click and drag images in mobile applications
US7797529B2 (en) * 2003-11-10 2010-09-14 Yahoo! Inc. Upload security scheme
WO2005048544A1 (en) * 2003-11-17 2005-05-26 Hardt Dick C Method and system for pseudonymous email address
US20050120019A1 (en) * 2003-11-29 2005-06-02 International Business Machines Corporation Method and apparatus for the automatic identification of unsolicited e-mail messages (SPAM)
US20050120118A1 (en) * 2003-12-01 2005-06-02 Thibadeau Robert H. Novel network server for electronic mail filter benchmarking
US20050160144A1 (en) * 2003-12-24 2005-07-21 Rishi Bhatia System and method for filtering network messages
JP4386261B2 (en) * 2004-01-15 2009-12-16 株式会社エヌ・ティ・ティ・ドコモ Mobile communication terminal and charging control apparatus
US7590694B2 (en) * 2004-01-16 2009-09-15 Gozoom.Com, Inc. System for determining degrees of similarity in email message information
US7693943B2 (en) * 2004-01-23 2010-04-06 International Business Machines Corporation Classification of electronic mail into multiple directories based upon their spam-like properties
US7653695B2 (en) * 2004-02-17 2010-01-26 Ironport Systems, Inc. Collecting, aggregating, and managing information relating to electronic messages
US10257164B2 (en) 2004-02-27 2019-04-09 International Business Machines Corporation Classifying e-mail connections for policy enforcement
US8214438B2 (en) * 2004-03-01 2012-07-03 Microsoft Corporation (More) advanced spam detection features
US20050198508A1 (en) * 2004-03-04 2005-09-08 Beck Stephen H. Method and system for transmission and processing of authenticated electronic mail
US7644127B2 (en) * 2004-03-09 2010-01-05 Gozoom.Com, Inc. Email analysis using fuzzy matching of text
US8918466B2 (en) * 2004-03-09 2014-12-23 Tonny Yu System for email processing and analysis
US7631044B2 (en) 2004-03-09 2009-12-08 Gozoom.Com, Inc. Suppression of undesirable network messages
US20050223074A1 (en) * 2004-03-31 2005-10-06 Morris Robert P System and method for providing user selectable electronic message action choices and processing
US7913302B2 (en) 2004-05-02 2011-03-22 Markmonitor, Inc. Advanced responses to online fraud
US8769671B2 (en) 2004-05-02 2014-07-01 Markmonitor Inc. Online fraud solution
US7457823B2 (en) 2004-05-02 2008-11-25 Markmonitor Inc. Methods and systems for analyzing data related to possible online fraud
US8041769B2 (en) * 2004-05-02 2011-10-18 Markmonitor Inc. Generating phish messages
US7992204B2 (en) * 2004-05-02 2011-08-02 Markmonitor, Inc. Enhanced responses to online fraud
US9203648B2 (en) 2004-05-02 2015-12-01 Thomson Reuters Global Resources Online fraud solution
US7870608B2 (en) 2004-05-02 2011-01-11 Markmonitor, Inc. Early detection and monitoring of online fraud
US7912905B2 (en) * 2004-05-18 2011-03-22 Computer Associates Think, Inc. System and method for filtering network messages
CN101288060B (en) * 2004-05-25 2012-11-07 波斯蒂尼公司 Electronic message source reputation information system
US7552365B1 (en) * 2004-05-26 2009-06-23 Amazon Technologies, Inc. Web site system with automated processes for detecting failure events and for selecting failure events for which to request user feedback
US7461063B1 (en) * 2004-05-26 2008-12-02 Proofpoint, Inc. Updating logistic regression models using coherent gradient
US7756930B2 (en) * 2004-05-28 2010-07-13 Ironport Systems, Inc. Techniques for determining the reputation of a message sender
US7917588B2 (en) 2004-05-29 2011-03-29 Ironport Systems, Inc. Managing delivery of electronic messages using bounce profiles
US8527752B2 (en) 2004-06-16 2013-09-03 Dormarke Assets Limited Liability Graduated authentication in an identity management system
US8504704B2 (en) 2004-06-16 2013-08-06 Dormarke Assets Limited Liability Company Distributed contact information management
US7748038B2 (en) * 2004-06-16 2010-06-29 Ironport Systems, Inc. Method and apparatus for managing computer virus outbreaks
US9245266B2 (en) 2004-06-16 2016-01-26 Callahan Cellular L.L.C. Auditable privacy policies in a distributed hierarchical identity management system
US7565445B2 (en) 2004-06-18 2009-07-21 Fortinet, Inc. Systems and methods for categorizing network traffic content
US8353028B2 (en) * 2004-06-21 2013-01-08 Ebay Inc. Render engine, and method of using the same, to verify data for access and/or publication via a computer system
US7680890B1 (en) 2004-06-22 2010-03-16 Wei Lin Fuzzy logic voting method and system for classifying e-mail using inputs from multiple spam classifiers
US7953814B1 (en) * 2005-02-28 2011-05-31 Mcafee, Inc. Stopping and remediating outbound messaging abuse
US8484295B2 (en) 2004-12-21 2013-07-09 Mcafee, Inc. Subscriber reputation filtering method for analyzing subscriber activity and detecting account misuse
US7552186B2 (en) * 2004-06-28 2009-06-23 International Business Machines Corporation Method and system for filtering spam using an adjustable reliability value
US7664819B2 (en) * 2004-06-29 2010-02-16 Microsoft Corporation Incremental anti-spam lookup and update service
US8819142B1 (en) * 2004-06-30 2014-08-26 Google Inc. Method for reclassifying a spam-filtered email message
US7904517B2 (en) 2004-08-09 2011-03-08 Microsoft Corporation Challenge response systems
US7660865B2 (en) 2004-08-12 2010-02-09 Microsoft Corporation Spam filtering with probabilistic secure hashes
FI20041159A0 (en) * 2004-09-07 2004-09-07 Nokia Corp A method for filtering messages over a computer network
US7555524B1 (en) * 2004-09-16 2009-06-30 Symantec Corporation Bulk electronic message detection by header similarity analysis
US8180834B2 (en) * 2004-10-07 2012-05-15 Computer Associates Think, Inc. System, method, and computer program product for filtering messages and training a classification module
US7849506B1 (en) * 2004-10-12 2010-12-07 Avaya Inc. Switching device, method, and computer program for efficient intrusion detection
US8433768B1 (en) * 2004-10-14 2013-04-30 Lockheed Martin Corporation Embedded model interaction within attack projection framework of information system
US7711781B2 (en) * 2004-11-09 2010-05-04 International Business Machines Corporation Technique for detecting and blocking unwanted instant messages
US20060112430A1 (en) * 2004-11-19 2006-05-25 Deisenroth Jerrold M Method and apparatus for immunizing data in computer systems from corruption
WO2006060581A2 (en) * 2004-11-30 2006-06-08 Sensory Networks Inc. Apparatus and method for acceleration of security applications through pre-filtering
US20060123478A1 (en) * 2004-12-02 2006-06-08 Microsoft Corporation Phishing detection, prevention, and notification
US7634810B2 (en) * 2004-12-02 2009-12-15 Microsoft Corporation Phishing detection, prevention, and notification
US8291065B2 (en) * 2004-12-02 2012-10-16 Microsoft Corporation Phishing detection, prevention, and notification
US7577984B2 (en) * 2004-12-09 2009-08-18 Microsoft Corporation Method and system for a sending domain to establish a trust that its senders communications are not unwanted
US7653812B2 (en) * 2004-12-09 2010-01-26 Microsoft Corporation Method and system for evaluating confidence in a sending domain to accurately assign a trust that a communication is not unwanted
EP1672936B1 (en) * 2004-12-16 2018-12-05 Sony Mobile Communications Inc. Prevention of unsolicited messages
US9160755B2 (en) 2004-12-21 2015-10-13 Mcafee, Inc. Trusted communication network
US8738708B2 (en) * 2004-12-21 2014-05-27 Mcafee, Inc. Bounce management in a trusted communication network
US20060168030A1 (en) * 2004-12-21 2006-07-27 Lucent Technologies, Inc. Anti-spam service
US9015472B1 (en) 2005-03-10 2015-04-21 Mcafee, Inc. Marking electronic messages to indicate human origination
US8396927B2 (en) * 2004-12-21 2013-03-12 Alcatel Lucent Detection of unwanted messages (spam)
US7716743B2 (en) * 2005-01-14 2010-05-11 Microsoft Corporation Privacy friendly malware quarantines
US8087068B1 (en) 2005-03-08 2011-12-27 Google Inc. Verifying access to a network account over multiple user communication portals based on security criteria
US8103868B2 (en) * 2005-04-20 2012-01-24 M-Qube, Inc. Sender identification system and method
WO2006122055A2 (en) * 2005-05-05 2006-11-16 Ironport Systems, Inc. Method of determining network addresses of senders of electronic mail messages
JP4559295B2 (en) * 2005-05-17 2010-10-06 株式会社エヌ・ティ・ティ・ドコモ Data communication system and data communication method
US7600126B2 (en) * 2005-05-27 2009-10-06 Microsoft Corporation Efficient processing of time-bounded messages
US20060277259A1 (en) * 2005-06-07 2006-12-07 Microsoft Corporation Distributed sender reputations
US7552230B2 (en) 2005-06-15 2009-06-23 International Business Machines Corporation Method and apparatus for reducing spam on peer-to-peer networks
US7823200B2 (en) * 2005-07-01 2010-10-26 Symantec Corporation Methods and systems for detecting and preventing the spread of malware on instant messaging (IM) networks by analyzing message traffic patterns
US7822818B2 (en) * 2005-07-01 2010-10-26 Symantec Corporation Methods and systems for detecting and preventing the spread of malware on instant messaging (IM) networks by using automated IM users
US7600258B2 (en) * 2005-07-01 2009-10-06 Symantec Corporation Methods and systems for detecting and preventing the spread of malware on instant messaging (IM) networks by using fictitious buddies
US7577993B2 (en) * 2005-07-01 2009-08-18 Symantec Corporation Methods and systems for detecting and preventing the spread of malware on instant messaging (IM) networks by using Bayesian filtering
US7610345B2 (en) 2005-07-28 2009-10-27 Vaporstream Incorporated Reduced traceability electronic message system and method
US9282081B2 (en) 2005-07-28 2016-03-08 Vaporstream Incorporated Reduced traceability electronic message system and method
US7930353B2 (en) * 2005-07-29 2011-04-19 Microsoft Corporation Trees of classifiers for detecting email spam
US20070124582A1 (en) * 2005-08-07 2007-05-31 Marvin Shannon System and Method for an NSP or ISP to Detect Malware in its Network Traffic
US7577994B1 (en) * 2005-08-25 2009-08-18 Symantec Corporation Detecting local graphic password deciphering attacks
US20070061402A1 (en) * 2005-09-15 2007-03-15 Microsoft Corporation Multipurpose internet mail extension (MIME) analysis
CN100490426C (en) * 2005-09-27 2009-05-20 腾讯科技(深圳)有限公司 Method and system for counteracting rubbish e-mails
EP1936892A4 (en) * 2005-10-15 2009-02-11 Huawei Tech Co Ltd A system for controlling the security of network and a method thereof
CN100459798C (en) * 2005-10-15 2009-02-04 华为技术有限公司 Method and system for providing safety service to mobile terminal
CN1852268B (en) * 2005-10-19 2012-02-29 华为技术有限公司 Junk-mail preventing method and system
US8065370B2 (en) 2005-11-03 2011-11-22 Microsoft Corporation Proofs to filter spam
US20070106734A1 (en) * 2005-11-10 2007-05-10 Motorola, Inc. Incentive driven subscriber assisted spam reduction
US8713122B2 (en) * 2005-11-10 2014-04-29 International Business Machines Corporation Message value indicator
US20070136428A1 (en) * 2005-12-08 2007-06-14 International Business Machines Corporation Methods, systems, and computer program products for implementing community messaging services
US7565366B2 (en) * 2005-12-14 2009-07-21 Microsoft Corporation Variable rate sampling for sequence analysis
US20070180031A1 (en) * 2006-01-30 2007-08-02 Microsoft Corporation Email Opt-out Enforcement
US20070192490A1 (en) * 2006-02-13 2007-08-16 Minhas Sandip S Content-based filtering of electronic messages
EP1999693A2 (en) * 2006-02-21 2008-12-10 Correlix Ltd. Method and system for transaction monitoring in a communication network
EP1833269B1 (en) * 2006-03-06 2010-05-12 Alcatel Lucent Condition control for transmitting messages
US7685271B1 (en) * 2006-03-30 2010-03-23 Symantec Corporation Distributed platform for testing filtering rules
US20070256133A1 (en) * 2006-04-27 2007-11-01 Garbow Zachary A Blocking processes from executing based on votes
US7680891B1 (en) 2006-06-19 2010-03-16 Google Inc. CAPTCHA-based spam control for content creation systems
US8023927B1 (en) 2006-06-29 2011-09-20 Google Inc. Abuse-resistant method of registering user accounts with an online service
US20080077704A1 (en) * 2006-09-24 2008-03-27 Void Communications, Inc. Variable Electronic Communication Ping Time System and Method
US7945627B1 (en) 2006-09-28 2011-05-17 Bitdefender IPR Management Ltd. Layout-based electronic communication filtering systems and methods
US8224905B2 (en) 2006-12-06 2012-07-17 Microsoft Corporation Spam filtration utilizing sender activity data
US8510467B2 (en) * 2007-01-11 2013-08-13 Ept Innovation Monitoring a message associated with an action
US8290203B1 (en) * 2007-01-11 2012-10-16 Proofpoint, Inc. Apparatus and method for detecting images within spam
US8209381B2 (en) * 2007-01-19 2012-06-26 Yahoo! Inc. Dynamic combatting of SPAM and phishing attacks
US8364617B2 (en) * 2007-01-19 2013-01-29 Microsoft Corporation Resilient classification of data
US7873583B2 (en) * 2007-01-19 2011-01-18 Microsoft Corporation Combining resilient classifiers
US20080177843A1 (en) * 2007-01-22 2008-07-24 Microsoft Corporation Inferring email action based on user input
WO2008101165A2 (en) * 2007-02-15 2008-08-21 Void Communications, Inc. Electronic messaging recordlessness warning and routing system and method
US8006191B1 (en) 2007-03-21 2011-08-23 Google Inc. Chat room with thin walls
US8015246B1 (en) 2007-03-21 2011-09-06 Google Inc. Graphical user interface for chat room with thin walls
US7865553B1 (en) * 2007-03-22 2011-01-04 Google Inc. Chat system without topic-specific rooms
US7904500B1 (en) 2007-03-22 2011-03-08 Google Inc. Advertising in chat system without topic-specific rooms
US7860928B1 (en) * 2007-03-22 2010-12-28 Google Inc. Voting in chat system without topic-specific rooms
US7899869B1 (en) 2007-03-22 2011-03-01 Google Inc. Broadcasting in chat system without topic-specific rooms
US7853589B2 (en) * 2007-04-30 2010-12-14 Microsoft Corporation Web spam page classification using query-dependent data
US20080313285A1 (en) * 2007-06-14 2008-12-18 Microsoft Corporation Post transit spam filtering
US20090006532A1 (en) * 2007-06-28 2009-01-01 Yahoo! Inc. Dynamic phishing protection in instant messaging
US8239460B2 (en) * 2007-06-29 2012-08-07 Microsoft Corporation Content-based tagging of RSS feeds and E-mail
US20090012965A1 (en) * 2007-07-01 2009-01-08 Decisionmark Corp. Network Content Objection Handling System and Method
US20090006211A1 (en) * 2007-07-01 2009-01-01 Decisionmark Corp. Network Content And Advertisement Distribution System and Method
US8849909B2 (en) * 2007-07-06 2014-09-30 Yahoo! Inc. Real-time asynchronous event aggregation systems
US7937468B2 (en) * 2007-07-06 2011-05-03 Yahoo! Inc. Detecting spam messages using rapid sender reputation feedback analysis
US8689330B2 (en) * 2007-09-05 2014-04-01 Yahoo! Inc. Instant messaging malware protection
US9363231B2 (en) * 2007-09-13 2016-06-07 Caterpillar Inc. System and method for monitoring network communications originating in monitored jurisdictions
US8230025B2 (en) * 2007-09-20 2012-07-24 Research In Motion Limited System and method for delivering variable size messages based on spam probability
US8572184B1 (en) 2007-10-04 2013-10-29 Bitdefender IPR Management Ltd. Systems and methods for dynamically integrating heterogeneous anti-spam filters
US8428367B2 (en) * 2007-10-26 2013-04-23 International Business Machines Corporation System and method for electronic document classification
US8010614B1 (en) 2007-11-01 2011-08-30 Bitdefender IPR Management Ltd. Systems and methods for generating signatures for electronic communication classification
US8171388B2 (en) * 2007-11-15 2012-05-01 Yahoo! Inc. Trust based moderation
US8239537B2 (en) 2008-01-02 2012-08-07 At&T Intellectual Property I, L.P. Method of throttling unwanted network traffic on a server
US8301695B2 (en) * 2008-02-14 2012-10-30 Lg Electronics Inc. Terminal, server and method for determining and processing contents as spams
US7849146B2 (en) * 2008-02-21 2010-12-07 Yahoo! Inc. Identifying IP addresses for spammers
US8401968B1 (en) * 2008-03-27 2013-03-19 Amazon Technologies, Inc. Mobile group payments
US20090282112A1 (en) * 2008-05-12 2009-11-12 Cloudmark, Inc. Spam identification system
US8108323B2 (en) * 2008-05-19 2012-01-31 Yahoo! Inc. Distributed spam filtering utilizing a plurality of global classifiers and a local classifier
US8131655B1 (en) 2008-05-30 2012-03-06 Bitdefender IPR Management Ltd. Spam filtering using feature relevance assignment in neural networks
US20090319629A1 (en) * 2008-06-23 2009-12-24 De Guerre James Allan Systems and methods for re-evaluatng data
CN101616101B (en) 2008-06-26 2012-01-18 阿里巴巴集团控股有限公司 Method and device for filtering user information
US8490185B2 (en) * 2008-06-27 2013-07-16 Microsoft Corporation Dynamic spam view settings
WO2010002892A1 (en) 2008-06-30 2010-01-07 Aol Llc Systems and methods for reporter-based filtering of electronic communications and messages
US8181250B2 (en) * 2008-06-30 2012-05-15 Microsoft Corporation Personalized honeypot for detecting information leaks and security breaches
CN101330476B (en) * 2008-07-02 2011-04-13 北京大学 Method for dynamically detecting junk mail
CN101321365B (en) * 2008-07-17 2011-12-28 浙江大学 Rubbish message sending user identification method by message reply frequency
US8291024B1 (en) * 2008-07-31 2012-10-16 Trend Micro Incorporated Statistical spamming behavior analysis on mail clusters
US10354229B2 (en) * 2008-08-04 2019-07-16 Mcafee, Llc Method and system for centralized contact management
US8069128B2 (en) * 2008-08-08 2011-11-29 Yahoo! Inc. Real-time ad-hoc spam filtering of email
US8095612B2 (en) 2008-09-19 2012-01-10 Mailrank, Inc. Ranking messages in an electronic messaging environment
US8826450B2 (en) * 2008-09-19 2014-09-02 Yahoo! Inc. Detecting bulk fraudulent registration of email accounts
US8069210B2 (en) * 2008-10-10 2011-11-29 Microsoft Corporation Graph based bot-user detection
US8365267B2 (en) * 2008-11-13 2013-01-29 Yahoo! Inc. Single use web based passwords for network login
CN101415159B (en) * 2008-12-02 2010-06-02 腾讯科技(深圳)有限公司 Method and apparatus for intercepting junk mail
US8364766B2 (en) * 2008-12-04 2013-01-29 Yahoo! Inc. Spam filtering based on statistics and token frequency modeling
US8886728B2 (en) 2008-12-12 2014-11-11 At&T Intellectual Property I, L.P. Method and apparatus for reclassifying e-mail or modifying a spam filter based on users' input
US20100161537A1 (en) * 2008-12-23 2010-06-24 At&T Intellectual Property I, L.P. System and Method for Detecting Email Spammers
US8195753B2 (en) * 2009-01-07 2012-06-05 Microsoft Corporation Honoring user preferences in email systems
US8255468B2 (en) * 2009-02-11 2012-08-28 Microsoft Corporation Email management based on user behavior
US20100211641A1 (en) * 2009-02-16 2010-08-19 Microsoft Corporation Personalized email filtering
US20100211645A1 (en) * 2009-02-18 2010-08-19 Yahoo! Inc. Identification of a trusted message sender with traceable receipts
US8443447B1 (en) * 2009-08-06 2013-05-14 Trend Micro Incorporated Apparatus and method for detecting malware-infected electronic mail
US8874663B2 (en) * 2009-08-28 2014-10-28 Facebook, Inc. Comparing similarity between documents for filtering unwanted documents
CN101656923B (en) * 2009-09-15 2012-09-05 中兴通讯股份有限公司 Method and system for judging spam message
EP2348424A1 (en) 2009-12-21 2011-07-27 Thomson Licensing Method for recommending content items to users
US8370902B2 (en) * 2010-01-29 2013-02-05 Microsoft Corporation Rescuing trusted nodes from filtering of untrusted network entities
US9098459B2 (en) * 2010-01-29 2015-08-04 Microsoft Technology Licensing, Llc Activity filtering based on trust ratings of network
US8959159B2 (en) 2010-04-01 2015-02-17 Microsoft Corporation Personalized email interactions applied to global filtering
SG177015A1 (en) * 2010-06-07 2012-01-30 Boxsentry Pte Ltd In situ correction of false-positive errors in messaging security systems (lagotto)
US8639773B2 (en) * 2010-06-17 2014-01-28 Microsoft Corporation Discrepancy detection for web crawling
US8635289B2 (en) 2010-08-31 2014-01-21 Microsoft Corporation Adaptive electronic message scanning
US8464342B2 (en) 2010-08-31 2013-06-11 Microsoft Corporation Adaptively selecting electronic message scanning rules
US10574630B2 (en) * 2011-02-15 2020-02-25 Webroot Inc. Methods and apparatus for malware threat research
CN102760130B (en) * 2011-04-27 2016-11-16 腾讯科技(深圳)有限公司 The method and apparatus of process information
WO2013050837A1 (en) * 2011-05-06 2013-04-11 Quojax Corp. System and method for giving users control of information flow
RU2472308C1 (en) * 2011-05-19 2013-01-10 Владимир Алексеевич Небольсин Prevention of unauthorised bulk e-mail
US9519682B1 (en) 2011-05-26 2016-12-13 Yahoo! Inc. User trustworthiness
US9519883B2 (en) 2011-06-28 2016-12-13 Microsoft Technology Licensing, Llc Automatic project content suggestion
IL214360A (en) * 2011-07-31 2016-05-31 Verint Systems Ltd System and method for main page identification in web decoding
US9442881B1 (en) 2011-08-31 2016-09-13 Yahoo! Inc. Anti-spam transient entity classification
US8682990B2 (en) 2011-10-03 2014-03-25 Microsoft Corporation Identifying first contact unsolicited communications
WO2013058678A1 (en) 2011-10-19 2013-04-25 Ikonomov Artashes Valer Evich Device for controlling network user data
CN103166830B (en) * 2011-12-14 2016-02-10 中国电信股份有限公司 A kind of Spam Filtering System of intelligent selection training sample and method
CN103220262A (en) * 2012-01-19 2013-07-24 北京千橡网景科技发展有限公司 Method and device for detecting spam message senders in website
US9130778B2 (en) * 2012-01-25 2015-09-08 Bitdefender IPR Management Ltd. Systems and methods for spam detection using frequency spectra of character strings
RU2510982C2 (en) 2012-04-06 2014-04-10 Закрытое акционерное общество "Лаборатория Касперского" User evaluation system and method for message filtering
WO2013172742A1 (en) * 2012-05-18 2013-11-21 Ikonomov Artashes Valeryevich System for interactive communication
US9660947B1 (en) * 2012-07-27 2017-05-23 Intuit Inc. Method and apparatus for filtering undesirable content based on anti-tags
CN103595614A (en) * 2012-08-16 2014-02-19 无锡华御信息技术有限公司 User feedback based junk mail detection method
US8938796B2 (en) 2012-09-20 2015-01-20 Paul Case, SR. Case secure computer architecture
US10115084B2 (en) 2012-10-10 2018-10-30 Artashes Valeryevich Ikonomov Electronic payment system
CN102946383B (en) * 2012-10-24 2015-11-18 珠海市君天电子科技有限公司 The method and system of a kind of remote inquiry based on third party's common interface, amendment virus characteristic
CN103078753B (en) * 2012-12-27 2016-07-13 华为技术有限公司 The processing method of a kind of mail, device and system
US10346411B1 (en) * 2013-03-14 2019-07-09 Google Llc Automatic target audience suggestions when sharing in a social network
US20140279734A1 (en) * 2013-03-15 2014-09-18 Hewlett-Packard Development Company, L.P. Performing Cross-Validation Using Non-Randomly Selected Cases
US9027136B2 (en) 2013-04-22 2015-05-05 Imperva, Inc. Automatic generation of attribute values for rules of a web application layer attack detector
RU2541123C1 (en) * 2013-06-06 2015-02-10 Закрытое акционерное общество "Лаборатория Касперского" System and method of rating electronic messages to control spam
JP5572252B1 (en) * 2013-09-11 2014-08-13 株式会社Ubic Digital information analysis system, digital information analysis method, and digital information analysis program
CN103607339B (en) * 2013-09-11 2016-08-17 北京京东尚科信息技术有限公司 The method and system of mail sending strategy it is automatically adjusted based on content
WO2015060854A1 (en) * 2013-10-24 2015-04-30 Hewlett-Packard Development Company, L.P. Real-time inter-personal communication
CN103634201B (en) * 2013-11-12 2017-09-12 新浪网技术(中国)有限公司 E-mail system and its quarantined message processing method
US11568280B1 (en) * 2019-01-23 2023-01-31 Amdocs Development Limited System, method, and computer program for parental controls and recommendations based on artificial intelligence
US10778618B2 (en) * 2014-01-09 2020-09-15 Oath Inc. Method and system for classifying man vs. machine generated e-mail
US9942182B2 (en) * 2014-11-17 2018-04-10 At&T Intellectual Property I, L.P. System and method for cloud based IP mobile messaging spam detection and defense
US9160680B1 (en) 2014-11-18 2015-10-13 Kaspersky Lab Zao System and method for dynamic network resource categorization re-assignment
JP2016191973A (en) 2015-03-30 2016-11-10 日本電気株式会社 Information transfer device, leaning system, information transfer method, and program
US20170222960A1 (en) * 2016-02-01 2017-08-03 Linkedin Corporation Spam processing with continuous model training
US10397256B2 (en) * 2016-06-13 2019-08-27 Microsoft Technology Licensing, Llc Spam classification system based on network flow data
US9749360B1 (en) * 2017-01-05 2017-08-29 KnowBe4, Inc. Systems and methods for performing simulated phishing attacks using social engineering indicators
WO2018128403A1 (en) * 2017-01-06 2018-07-12 Samsung Electronics Co., Ltd. Apparatus and method for processing content
KR20180081444A (en) * 2017-01-06 2018-07-16 삼성전자주식회사 Apparatus and method for processing contents
EP3367261A1 (en) 2017-02-28 2018-08-29 Fraunhofer-Gesellschaft zur Förderung der angewandten Forschung e.V. Method for classifying information and classification processor
CN108694202A (en) * 2017-04-10 2018-10-23 上海交通大学 Configurable Spam Filtering System based on sorting algorithm and filter method
US20180337840A1 (en) * 2017-05-18 2018-11-22 Satori Worldwide, Llc System and method for testing filters for data streams in publisher-subscriber networks
US11232369B1 (en) * 2017-09-08 2022-01-25 Facebook, Inc. Training data quality for spam classification
US10635813B2 (en) 2017-10-06 2020-04-28 Sophos Limited Methods and apparatus for using machine learning on multiple file fragments to identify malware
JP2021503142A (en) * 2017-10-31 2021-02-04 エッジウェイブ・インコーポレイテッドEdgewave, Inc. Analysis and reporting of suspicious emails
CN110089076B (en) * 2017-11-22 2021-04-09 腾讯科技(深圳)有限公司 Method and device for realizing information interaction
US11003858B2 (en) * 2017-12-22 2021-05-11 Microsoft Technology Licensing, Llc AI system to determine actionable intent
CN108073718A (en) * 2017-12-29 2018-05-25 长春理工大学 A kind of mail two classification algorithm based on Active Learning and Negative Selection
KR102341623B1 (en) * 2018-01-22 2021-12-21 베이징 시아오미 모바일 소프트웨어 컴퍼니 리미티드 Methods, devices and systems for performing drive test minimization measurements
US11003774B2 (en) 2018-01-26 2021-05-11 Sophos Limited Methods and apparatus for detection of malicious documents using machine learning
US11941491B2 (en) 2018-01-31 2024-03-26 Sophos Limited Methods and apparatus for identifying an impact of a portion of a file on machine learning classification of malicious content
CN108401510A (en) 2018-02-08 2018-08-14 北京小米移动软件有限公司 MDT configuration methods and device
US11270205B2 (en) 2018-02-28 2022-03-08 Sophos Limited Methods and apparatus for identifying the shared importance of multiple nodes within a machine learning model for multiple tasks
US20190327127A1 (en) * 2018-04-23 2019-10-24 Entit Software Llc Information technology event management
KR102117543B1 (en) * 2018-04-26 2020-06-01 주식회사 슈퍼브에이아이 Computing device and artificial intelligence based image processing service system using the same
CN110213152B (en) * 2018-05-02 2021-09-14 腾讯科技(深圳)有限公司 Method, device, server and storage medium for identifying junk mails
US20220012510A1 (en) * 2018-05-17 2022-01-13 Hasan Mirjan Methods and systems of handwriting recognition in virtualized-mail services
US11281996B2 (en) * 2018-05-31 2022-03-22 Microsoft Technology Licensing, Llc Distributed computing system with a synthetic data as a service feedback loop engine
US20200371988A1 (en) * 2018-05-31 2020-11-26 Microsoft Technology Licensing, Llc Distributed Computing System with a Synthetic Data as a Service Frameset Package Generator
US11012500B2 (en) * 2018-07-27 2021-05-18 Vmware, Inc. Secure multi-directional data pipeline for data distribution systems
US11521108B2 (en) * 2018-07-30 2022-12-06 Microsoft Technology Licensing, Llc Privacy-preserving labeling and classification of email
US11212312B2 (en) 2018-08-09 2021-12-28 Microsoft Technology Licensing, Llc Systems and methods for polluting phishing campaign responses
US10601868B2 (en) 2018-08-09 2020-03-24 Microsoft Technology Licensing, Llc Enhanced techniques for generating and deploying dynamic false user accounts
US10922097B2 (en) * 2018-09-18 2021-02-16 International Business Machines Corporation Collaborative model execution
US11947668B2 (en) 2018-10-12 2024-04-02 Sophos Limited Methods and apparatus for preserving information between layers within a neural network
CN109471920A (en) * 2018-11-19 2019-03-15 北京锐安科技有限公司 A kind of method, apparatus of Text Flag, electronic equipment and storage medium
US11574052B2 (en) 2019-01-31 2023-02-07 Sophos Limited Methods and apparatus for using machine learning to detect potentially malicious obfuscated scripts
JP6992774B2 (en) * 2019-02-13 2022-01-13 セイコーエプソン株式会社 Information processing device, learning device and trained model
CN111815306B (en) * 2019-04-11 2024-03-26 深圳市家家分类科技有限公司 Method for ordering service by going up door and related equipment
CN110598157B (en) * 2019-09-20 2023-01-03 北京字节跳动网络技术有限公司 Target information identification method, device, equipment and storage medium
RU2717721C1 (en) * 2019-09-20 2020-03-25 Антон Борисович Ёркин Method of creating automated information security management systems and a system for implementing same
US11347572B2 (en) 2019-09-26 2022-05-31 Vmware, Inc. Methods and apparatus for data pipelines between cloud computing platforms
US11757816B1 (en) * 2019-11-11 2023-09-12 Trend Micro Incorporated Systems and methods for detecting scam emails
US11722503B2 (en) * 2020-05-05 2023-08-08 Accenture Global Solutions Limited Responsive privacy-preserving system for detecting email threats
US11438370B2 (en) * 2020-07-16 2022-09-06 Capital One Services, Llc Email security platform
US20220138317A1 (en) * 2020-10-29 2022-05-05 Proofpoint, Inc. Detecting and Protecting Against Cybersecurity Attacks Using Unprintable Tracking Characters
CN114040409B (en) * 2021-11-11 2023-06-06 中国联合网络通信集团有限公司 Short message identification method, device, equipment and storage medium
CN115952207B (en) * 2022-12-21 2024-02-20 北京中睿天下信息技术有限公司 Threat mail storage method and system based on Starblocks database

Family Cites Families (126)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB8918553D0 (en) 1989-08-15 1989-09-27 Digital Equipment Int Message control system
US5758257A (en) 1994-11-29 1998-05-26 Herz; Frederick System and method for scheduling broadcast of and access to video programs and other data using customer profiles
US5619648A (en) 1994-11-30 1997-04-08 Lucent Technologies Inc. Message filtering techniques
US5638487A (en) 1994-12-30 1997-06-10 Purespeech, Inc. Automatic speech recognition
WO1996035994A1 (en) 1995-05-08 1996-11-14 Compuserve Incorporated Rules based electronic message management system
US5845077A (en) 1995-11-27 1998-12-01 Microsoft Corporation Method and system for identifying and obtaining computer software from a remote computer
US6101531A (en) 1995-12-19 2000-08-08 Motorola, Inc. System for communicating user-selected criteria filter prepared at wireless client to communication server for filtering data transferred from host to said wireless client
US5704017A (en) 1996-02-16 1997-12-30 Microsoft Corporation Collaborative filtering utilizing a belief network
US5884033A (en) 1996-05-15 1999-03-16 Spyglass, Inc. Internet filtering system for filtering data transferred over the internet utilizing immediate and deferred filtering actions
US6453327B1 (en) * 1996-06-10 2002-09-17 Sun Microsystems, Inc. Method and apparatus for identifying and discarding junk electronic mail
US6072942A (en) 1996-09-18 2000-06-06 Secure Computing Corporation System and method of electronic mail filtering using interconnected nodes
DE69607166T2 (en) * 1996-10-15 2000-12-14 St Microelectronics Srl Electronic arrangement for performing convolutional operations
US5805801A (en) 1997-01-09 1998-09-08 International Business Machines Corporation System and method for detecting and preventing security
US5905859A (en) 1997-01-09 1999-05-18 International Business Machines Corporation Managed network device security method and apparatus
US6122657A (en) 1997-02-04 2000-09-19 Networks Associates, Inc. Internet computer system with methods for dynamic filtering of hypertext tags and content
US6742047B1 (en) * 1997-03-27 2004-05-25 Intel Corporation Method and apparatus for dynamically filtering network content
EP0881559B1 (en) 1997-05-28 2003-08-20 Siemens Aktiengesellschaft Computer system for protecting software and a method for protecting software
US7117358B2 (en) 1997-07-24 2006-10-03 Tumbleweed Communications Corp. Method and system for filtering communication
US6199102B1 (en) 1997-08-26 2001-03-06 Christopher Alan Cobb Method and system for filtering electronic messages
US6041324A (en) 1997-11-17 2000-03-21 International Business Machines Corporation System and method for identifying valid portion of computer resource identifier
US6003027A (en) 1997-11-21 1999-12-14 International Business Machines Corporation System and method for determining confidence levels for the results of a categorization system
US6393465B2 (en) 1997-11-25 2002-05-21 Nixmail Corporation Junk electronic mail detector and eliminator
US6351740B1 (en) * 1997-12-01 2002-02-26 The Board Of Trustees Of The Leland Stanford Junior University Method and system for training dynamic nonlinear adaptive filters which have embedded memory
US6023723A (en) 1997-12-22 2000-02-08 Accepted Marketing, Inc. Method and system for filtering unwanted junk e-mail utilizing a plurality of filtering mechanisms
WO1999032985A1 (en) * 1997-12-22 1999-07-01 Accepted Marketing, Inc. E-mail filter and method thereof
US6052709A (en) 1997-12-23 2000-04-18 Bright Light Technologies, Inc. Apparatus and method for controlling delivery of unsolicited electronic mail
GB2334116A (en) 1998-02-04 1999-08-11 Ibm Scheduling and dispatching queued client requests within a server computer
US6484261B1 (en) 1998-02-17 2002-11-19 Cisco Technology, Inc. Graphical network security policy management
US6504941B2 (en) 1998-04-30 2003-01-07 Hewlett-Packard Company Method and apparatus for digital watermarking of images
US6314421B1 (en) * 1998-05-12 2001-11-06 David M. Sharnoff Method and apparatus for indexing documents for message filtering
US6074942A (en) * 1998-06-03 2000-06-13 Worldwide Semiconductor Manufacturing Corporation Method for forming a dual damascene contact and interconnect
US6308273B1 (en) 1998-06-12 2001-10-23 Microsoft Corporation Method and system of security location discrimination
US6192360B1 (en) 1998-06-23 2001-02-20 Microsoft Corporation Methods and apparatus for classifying text and for building a text classifier
US6161130A (en) 1998-06-23 2000-12-12 Microsoft Corporation Technique which utilizes a probabilistic classifier to detect "junk" e-mail by automatically updating a training and re-training the classifier based on the updated training set
US6167434A (en) * 1998-07-15 2000-12-26 Pang; Stephen Y. Computer code for removing junk e-mail messages
US6112227A (en) 1998-08-06 2000-08-29 Heiner; Jeffrey Nelson Filter-in method for reducing junk e-mail
US6434600B2 (en) 1998-09-15 2002-08-13 Microsoft Corporation Methods and systems for securely delivering electronic mail to hosts having dynamic IP addresses
US6732273B1 (en) 1998-10-21 2004-05-04 Lucent Technologies Inc. Priority and security coding system for electronic mail messages
GB2343529B (en) 1998-11-07 2003-06-11 Ibm Filtering incoming e-mail
US6546416B1 (en) 1998-12-09 2003-04-08 Infoseek Corporation Method and system for selectively blocking delivery of bulk electronic mail
US6643686B1 (en) 1998-12-18 2003-11-04 At&T Corp. System and method for counteracting message filtering
US6477531B1 (en) * 1998-12-18 2002-11-05 Motive Communications, Inc. Technical support chain automation with guided self-help capability using active content
US6857051B2 (en) 1998-12-23 2005-02-15 Intel Corporation Method and apparatus for maintaining cache coherence in a computer system
US6615242B1 (en) 1998-12-28 2003-09-02 At&T Corp. Automatic uniform resource locator-based message filter
US6266692B1 (en) 1999-01-04 2001-07-24 International Business Machines Corporation Method for blocking all unwanted e-mail (SPAM) using a header-based password
US6330590B1 (en) 1999-01-05 2001-12-11 William D. Cotten Preventing delivery of unwanted bulk e-mail
US6424997B1 (en) 1999-01-27 2002-07-23 International Business Machines Corporation Machine learning based electronic messaging system
US6449634B1 (en) 1999-01-29 2002-09-10 Digital Impact, Inc. Method and system for remotely sensing the file formats processed by an E-mail client
US6477551B1 (en) 1999-02-16 2002-11-05 International Business Machines Corporation Interactive electronic messaging system
US7032030B1 (en) 1999-03-11 2006-04-18 John David Codignotto Message publishing system and method
US6732149B1 (en) 1999-04-09 2004-05-04 International Business Machines Corporation System and method for hindering undesired transmission or receipt of electronic messages
US6370526B1 (en) 1999-05-18 2002-04-09 International Business Machines Corporation Self-adaptive method and system for providing a user-preferred ranking order of object sets
DE19923093A1 (en) * 1999-05-20 2000-11-23 Mann & Hummel Filter Fluid separator for purifying IC engine crankshaft gases has a separator cartridge with an elastic end plate on at least one of its front sides corresponding to a receiver
US6592627B1 (en) 1999-06-10 2003-07-15 International Business Machines Corporation System and method for organizing repositories of semi-structured documents such as email
US6449636B1 (en) 1999-09-08 2002-09-10 Nortel Networks Limited System and method for creating a dynamic data file from collected and filtered web pages
US6728690B1 (en) 1999-11-23 2004-04-27 Microsoft Corporation Classification system trainer employing maximum margin back-propagation with probabilistic outputs
US6321267B1 (en) * 1999-11-23 2001-11-20 Escom Corporation Method and apparatus for filtering junk email
US6633855B1 (en) * 2000-01-06 2003-10-14 International Business Machines Corporation Method, system, and program for filtering content using neural networks
US6701440B1 (en) * 2000-01-06 2004-03-02 Networks Associates Technology, Inc. Method and system for protecting a computer using a remote e-mail scanning device
US7822977B2 (en) 2000-02-08 2010-10-26 Katsikas Peter L System for eliminating unauthorized electronic mail
US6691156B1 (en) 2000-03-10 2004-02-10 International Business Machines Corporation Method for restricting delivery of unsolicited E-mail
US6684201B1 (en) 2000-03-31 2004-01-27 Microsoft Corporation Linguistic disambiguation system and method using string-based pattern training to learn to resolve ambiguity sites
US7210099B2 (en) 2000-06-12 2007-04-24 Softview Llc Resolution independent vector display of internet content
US20040073617A1 (en) * 2000-06-19 2004-04-15 Milliken Walter Clark Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail
CN1300677C (en) 2000-06-22 2007-02-14 微软公司 Distributed computing services platform
US7003555B1 (en) 2000-06-23 2006-02-21 Cloudshield Technologies, Inc. Apparatus and method for domain name resolution
US6779021B1 (en) 2000-07-28 2004-08-17 International Business Machines Corporation Method and system for predicting and managing undesirable electronic mail
US6842773B1 (en) * 2000-08-24 2005-01-11 Yahoo ! Inc. Processing of textual electronic communication distributed in bulk
US6971023B1 (en) 2000-10-03 2005-11-29 Mcafee, Inc. Authorizing an additional computer program module for use with a core computer program
US6757830B1 (en) 2000-10-03 2004-06-29 Networks Associates Technology, Inc. Detecting unwanted properties in received email messages
US6748422B2 (en) 2000-10-19 2004-06-08 Ebay Inc. System and method to control sending of unsolicited communications relating to a plurality of listings in a network-based commerce facility
US7243125B2 (en) 2000-12-08 2007-07-10 Xerox Corporation Method and apparatus for presenting e-mail threads as semi-connected text by removing redundant material
JP3554271B2 (en) 2000-12-13 2004-08-18 パナソニック コミュニケーションズ株式会社 Information communication equipment
US6775704B1 (en) 2000-12-28 2004-08-10 Networks Associates Technology, Inc. System and method for preventing a spoofed remote procedure call denial of service attack in a networked computing environment
US20020129111A1 (en) * 2001-01-15 2002-09-12 Cooper Gerald M. Filtering unsolicited email
US8219620B2 (en) * 2001-02-20 2012-07-10 Mcafee, Inc. Unwanted e-mail filtering system including voting feedback
US20020124025A1 (en) 2001-03-01 2002-09-05 International Business Machines Corporataion Scanning and outputting textual information in web page images
GB2373130B (en) 2001-03-05 2004-09-22 Messagelabs Ltd Method of,and system for,processing email in particular to detect unsolicited bulk email
US6928465B2 (en) 2001-03-16 2005-08-09 Wells Fargo Bank, N.A. Redundant email address detection and capture system
US6751348B2 (en) * 2001-03-29 2004-06-15 Fotonation Holdings, Llc Automated detection of pornographic images
US8949878B2 (en) 2001-03-30 2015-02-03 Funai Electric Co., Ltd. System for parental control in video programs based on multimedia content information
US6920477B2 (en) 2001-04-06 2005-07-19 President And Fellows Of Harvard College Distributed, compressed Bloom filter Web cache server
US8095597B2 (en) 2001-05-01 2012-01-10 Aol Inc. Method and system of automating data capture from electronic correspondence
US7188106B2 (en) 2001-05-01 2007-03-06 International Business Machines Corporation System and method for aggregating ranking results from various sources to improve the results of web searching
US6768991B2 (en) * 2001-05-15 2004-07-27 Networks Associates Technology, Inc. Searching for sequences of character data
US7103599B2 (en) 2001-05-15 2006-09-05 Verizon Laboratories Inc. Parsing of nested internet electronic mail documents
US20030009698A1 (en) 2001-05-30 2003-01-09 Cascadezone, Inc. Spam avenger
US7502829B2 (en) 2001-06-21 2009-03-10 Cybersoft, Inc. Apparatus, methods and articles of manufacture for intercepting, examining and controlling code, data and files and their transfer
US20030009495A1 (en) 2001-06-29 2003-01-09 Akli Adjaoute Systems and methods for filtering electronic content
US7328250B2 (en) * 2001-06-29 2008-02-05 Nokia, Inc. Apparatus and method for handling electronic mail
TW533380B (en) * 2001-07-23 2003-05-21 Ulead Systems Inc Group image detecting method
US6769016B2 (en) 2001-07-26 2004-07-27 Networks Associates Technology, Inc. Intelligent SPAM detection system using an updateable neural analysis engine
US7146402B2 (en) * 2001-08-31 2006-12-05 Sendmail, Inc. E-mail system providing filtering methodology on a per-domain basis
US20060036701A1 (en) 2001-11-20 2006-02-16 Bulfer Andrew F Messaging system having message filtering and access control
AU2002366933A1 (en) * 2001-12-13 2003-07-09 Youn-Sook Lee System and method for preventing spam mail
US6785820B1 (en) 2002-04-02 2004-08-31 Networks Associates Technology, Inc. System, method and computer program product for conditionally updating a security program
US20030204569A1 (en) 2002-04-29 2003-10-30 Michael R. Andrews Method and apparatus for filtering e-mail infected with a previously unidentified computer virus
US20030229672A1 (en) * 2002-06-05 2003-12-11 Kohn Daniel Mark Enforceable spam identification and reduction system, and method thereof
US8046832B2 (en) 2002-06-26 2011-10-25 Microsoft Corporation Spam detector with challenges
US8924484B2 (en) 2002-07-16 2014-12-30 Sonicwall, Inc. Active e-mail filter with challenge-response
US7363490B2 (en) 2002-09-12 2008-04-22 International Business Machines Corporation Method and system for selective email acceptance via encoded email identifiers
US7188369B2 (en) 2002-10-03 2007-03-06 Trend Micro, Inc. System and method having an antivirus virtual scanning processor with plug-in functionalities
US20040083270A1 (en) 2002-10-23 2004-04-29 David Heckerman Method and system for identifying junk e-mail
US7149801B2 (en) 2002-11-08 2006-12-12 Microsoft Corporation Memory bound functions for spam deterrence and the like
US6732157B1 (en) * 2002-12-13 2004-05-04 Networks Associates Technology, Inc. Comprehensive anti-spam system, method, and computer program product for filtering unwanted e-mail messages
AU2003288515A1 (en) 2002-12-26 2004-07-22 Commtouch Software Ltd. Detection and prevention of spam
US7533148B2 (en) 2003-01-09 2009-05-12 Microsoft Corporation Framework to enable integration of anti-spam technologies
US7171450B2 (en) 2003-01-09 2007-01-30 Microsoft Corporation Framework to enable integration of anti-spam technologies
US7249162B2 (en) * 2003-02-25 2007-07-24 Microsoft Corporation Adaptive junk message filtering system
US7219148B2 (en) * 2003-03-03 2007-05-15 Microsoft Corporation Feedback loop for spam prevention
US7543053B2 (en) * 2003-03-03 2009-06-02 Microsoft Corporation Intelligent quarantining for spam prevention
US7366761B2 (en) * 2003-10-09 2008-04-29 Abaca Technology Corporation Method for creating a whitelist for processing e-mails
US20040177120A1 (en) 2003-03-07 2004-09-09 Kirsch Steven T. Method for filtering e-mail messages
US7320020B2 (en) * 2003-04-17 2008-01-15 The Go Daddy Group, Inc. Mail server probability spam filter
US7653698B2 (en) * 2003-05-29 2010-01-26 Sonicwall, Inc. Identifying e-mail messages from allowed senders
US7293063B1 (en) 2003-06-04 2007-11-06 Symantec Corporation System utilizing updated spam signatures for performing secondary signature-based analysis of a held e-mail to improve spam email detection
US7263607B2 (en) 2003-06-12 2007-08-28 Microsoft Corporation Categorizing electronic messages based on trust between electronic messaging entities
US7051077B2 (en) 2003-06-30 2006-05-23 Mx Logic, Inc. Fuzzy logic voting method and system for classifying e-mail using inputs from multiple spam classifiers
US7155484B2 (en) 2003-06-30 2006-12-26 Bellsouth Intellectual Property Corporation Filtering email messages corresponding to undesirable geographical regions
US20050015455A1 (en) * 2003-07-18 2005-01-20 Liu Gary G. SPAM processing system and methods including shared information among plural SPAM filters
US7451487B2 (en) * 2003-09-08 2008-11-11 Sonicwall, Inc. Fraudulent message detection
US20050102366A1 (en) * 2003-11-07 2005-05-12 Kirsch Steven T. E-mail filter employing adaptive ruleset
US7359941B2 (en) * 2004-01-08 2008-04-15 International Business Machines Corporation Method and apparatus for filtering spam email
WO2005082101A2 (en) * 2004-02-26 2005-09-09 Truefire, Inc. Systems and methods for producing, managing, delivering, retrieving, and/or tracking permission based communications
US20050204159A1 (en) * 2004-03-09 2005-09-15 International Business Machines Corporation System, method and computer program to block spam
EP1767010B1 (en) 2004-06-15 2015-11-11 Tekelec Global, Inc. Method, system, and computer program products for content-based screening of MMS messages

Also Published As

Publication number Publication date
AU2004216772A1 (en) 2004-09-16
CA2513967A1 (en) 2004-09-16
US7219148B2 (en) 2007-05-15
EP1599781A2 (en) 2005-11-30
NO20053733L (en) 2005-08-24
US20070208856A1 (en) 2007-09-06
CO6141494A2 (en) 2010-03-19
EG23988A (en) 2008-03-05
MXPA05008303A (en) 2006-03-21
WO2004079514A2 (en) 2004-09-16
TWI331869B (en) 2010-10-11
ZA200506085B (en) 2006-11-29
WO2004079514A3 (en) 2006-03-30
US7558832B2 (en) 2009-07-07
AU2004216772A2 (en) 2004-09-16
NZ541628A (en) 2007-12-21
JP4828411B2 (en) 2011-11-30
JP2006521635A (en) 2006-09-21
BRPI0407045A (en) 2006-01-17
AU2004216772B2 (en) 2009-12-17
RU2331913C2 (en) 2008-08-20
CA2513967C (en) 2014-04-15
TW201036399A (en) 2010-10-01
KR20060006769A (en) 2006-01-19
CA2799691C (en) 2014-09-16
IL170115A (en) 2010-12-30
EP1599781A4 (en) 2011-12-07
TW200507576A (en) 2005-02-16
CA2799691A1 (en) 2004-09-16
IL206121A (en) 2012-03-29
RU2005124681A (en) 2006-01-20
US20040177110A1 (en) 2004-09-09
KR101021395B1 (en) 2011-03-14
CN1809821A (en) 2006-07-26

Similar Documents

Publication Publication Date Title
CN100472484C (en) Feedback loop for spam prevention
CN1658572B (en) Information classification system and method
JP2006521635A5 (en)
US20040181581A1 (en) Authentication method for preventing delivery of junk electronic mail
US20050015626A1 (en) System and method for identifying and filtering junk e-mail messages or spam based on URL content
CN103020113A (en) Message classification and management
CN102257466A (en) Image-based human interactive proofs
US20070124385A1 (en) Preference-based content distribution service
Wang et al. Using header session messages to anti-spamming
CN1988531B (en) Method and system for managing network communication
Lazzari et al. Cafe-collaborative agents for filtering e-mails
Zisiadis et al. Mailbook: A social network against spamming
Saxena et al. Spamizer: An approach to handle web form spam
WO2011101848A1 (en) Methods and systems for managing virtual identities
Vokorokos et al. Security issues of email marketing service
Mohamed Efficient Spam Filtering System Based on Smart Cooperative Subjective and Objective Methods
WO2001004787A2 (en) Method and system for classifying users of an electronic network
Lazzari et al. A collaborative and multi-agent system for e-mail filtering and classification
Albrecht Nicolas Burri Diploma Thesis November 4, 2003–March 3, 2004
KR20100127168A (en) How to Give a Member ID to the Website
Nagadeepa et al. GATEWAY ABSTRACTION FOR FOOLING THE SPAMMERS
Wang et al. Using Header Session Messages to Filter-out Junk E-mails
Mariyan Richard et al. Naïve Bayes Filter for Communication & Enhancing Semantic in Email
Spam CEAS 2005
Battling CINPlus Special Report

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
ASS Succession or assignment of patent right

Owner name: MICROSOFT TECHNOLOGY LICENSING LLC

Free format text: FORMER OWNER: MICROSOFT CORP.

Effective date: 20150513

C41 Transfer of patent application or patent right or utility model
TR01 Transfer of patent right

Effective date of registration: 20150513

Address after: Washington State

Patentee after: Micro soft technique license Co., Ltd

Address before: Washington State

Patentee before: Microsoft Corp.

CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20090325

Termination date: 20200225

CF01 Termination of patent right due to non-payment of annual fee